# malicious.link
About
Brandon
Categories
Posts
Start
Tags
# malicious.link
Cancel
About
Brandon
Categories
Posts
Start
Tags
All Posts
2013
Dumping a domain worth of passwords with mimikatz
10-05
AD Zone Transfers as a user
10-04
Stealing passwords every time they change
09-11
Changing proxychains hardcoded DNS server
09-10
Unkillable Processes
08-10
Problems with blogging software
08-10
Volume Shadow Copy NTDS.DIT Domain Hashes Remotely - Part 2
06-11
Volume Shadow Copy NTDS.dit Domain Hashes Remotely - Part 1
06-10
Using Mimikatz Alpha or Getting Clear Text Passwords with a Microsoft Tool
06-07
Query all windows services config from the command line
05-30
Sessiondump Meterpreter Extension
04-08
Metasploit Mastery @BlackHatEvents USA 2013
03-19
Length Sorting Wordlists
03-18
Mounting NFS shares through Meterpreter with NfSpy
03-04
Suggestions on what to do when a service you use gets compromised
03-02
Blocking Java Exploits, Malicious Signed Applets, and 0days
02-27
Compile NFSShell on Ubuntu
02-22
ShmooCon 2013 Streaming
02-15
Metasploit Mastery meets CanSecWest
01-25
Intro to White Chapel
01-19
Cyber Pickpocketing
01-06
2012
Delete TrustedInstaller-only Files and Folders
12-24
EXE::Custom in Metasploit's Java Exploits
11-19
Smash and Grab: Windows Dir Lists
11-13
Finding Admin Access
10-31
BypassUAC got a facelift
10-30
lm2ntlm with John the Ripper
10-24
AXFR for DNSSEC: DNSSEC Walker
10-22
Setting SYSTEM's proxy settings with Metasploit
10-21
Mounting SMB shares over Meterpreter
10-17
UAC AlwaysNotify Bypass-ish
10-16
Pass the Hash without Metasploit - Part 2
10-15
Compiling and Release of Ditto
10-08
Compiling and Release of Netview
10-07
Lab Setup - Windows Proxy and Egress Filtering
10-06
Meet “q” – Free Metasploit Exploit Pack
10-04
Dirty Little Secrets They Didn't Teach You In Pentest Class - Part 2 (Video)
10-01
Completely In-memory Mimikatz with Metasploit
09-06
Old School On-target NBNS Spoofing - Part 2
09-02
Old School On-target NBNS Spoofing
09-01
Free Shells with Plink and Pageant
08-28
Post Exploitation Command Lists - Request to Edit
08-25
LetMeOutOfYour.NET – Server Build
08-11
LetMeOutOfYour.NET – Intro
08-10
Free Ticket Contest - Metasploit Mastery at DerbyCon
08-07
Raising Zombies in Windows: Part 1 - Passwords
07-31
Cross-Protocol Chained Pass the Hash for Metasploit
07-10
Bypassing Trend Micro's Service Protection
07-05
Presence, Persistence, and Pivoting
06-29
Netstat Post Module for Meterpreter
06-28
Evidence of Compromise - Metasploit's PSEXEC
06-25
Companies that give back with free tools
06-20
Integration of Mimikatz into Metasploit Stage1
06-15
SUDOERS Commented Includes used for Evil
05-26
Post Exploitation with PhantomJS
05-25
Sticky Keys and Utilman against NLA
05-24
DerbyCon Training (Sep 27-28 2012)
05-22
Jasager - Past, Present and Future
05-12
phDays in Moscow
04-26
How to Win CCDC - Slides
03-19
Who is on your dream team red team?
03-04
Developing the LNK Metasploit post module with Mona
02-19
MS08_068 + MS10_046 = FUN UNTIL 2018
02-11
A @textfiles approach at gathering the world's DNS - Slides
02-03
(UAC) User Assisted Compromise
01-03
2011
Hak5 Segment Sneak Peak
12-26
Shared Links
12-23
Hash Types for John the Ripper
12-12
First day of a No Starch Christmas - Winner
12-01
12 Days of No Starch Press
11-27
Run POST Modules On All Sessions
11-02
MSFConsole Prompt Fiddling
10-09
The Dirty Little Secrets They Didn't Teach You In Pentesting Class
10-06
Create a 64bit Process From a x86/32bit One
09-28
#DerbyCon Approaches...
09-17
Who Is Logged In? A Quick Way To Pick Your Targets
09-17
Disconnect Stalled SSH Session
09-15
Multiple Dictionaries or Wordlists Using John the Ripper
09-12
Post Exploitation Command Lists
09-06
Wim Remes (@wimremes) for (ISC)2 Board of Directors
08-30
IIS Search Verb Directory Listing
08-26
Populating Your Virtual Victim Domain
08-20
IP Resolution Using Meterpreter’s Railgun
08-19
Railgun Error Checking
08-19
Minimum Password Length of 15 or more via GPO
07-26
Metasploit Payloads Explained - Part 1b
07-17
GPU Cracking Complaints
07-13
NoVA Hackers - 3 years old and still going strong
07-07
fxsst.dll persistence: the evil fax machine
06-27
Metasploit Payloads Explained - Part 1a
06-26
Metasploit Payloads Explained - Part 1
06-26
Remotely Suspend All Threads with Meterpreter
05-30
Remote DLL Injection with Meterpreter
05-30
Dumping Hashes on Win2k8 R2 x64 with Metasploit
05-16
Exploitable Mobile App Challenge
04-12
IPv6 Attacks
04-06
RSA Dun-got hacked! APT etc..
03-22
Metasploit VNC Password Extraction
03-21
Psychological Warfare with NirCMD
03-05
PHP Web Shell
03-04
1
2
3
4
5