Added ElusiveMice
This commit is contained in:
parent
d8e25c298a
commit
8ea4ca5845
|
@ -55,3 +55,6 @@
|
||||||
[submodule "red-teaming/RedWarden"]
|
[submodule "red-teaming/RedWarden"]
|
||||||
path = red-teaming/RedWarden
|
path = red-teaming/RedWarden
|
||||||
url = https://github.com/mgeeky/RedWarden
|
url = https://github.com/mgeeky/RedWarden
|
||||||
|
[submodule "red-teaming/ElusiveMice"]
|
||||||
|
path = red-teaming/ElusiveMice
|
||||||
|
url = https://github.com/mgeeky/ElusiveMice
|
||||||
|
|
|
@ -0,0 +1 @@
|
||||||
|
Subproject commit bfa8889dfb830a59dfa8d1852404f0697e403d29
|
|
@ -113,6 +113,7 @@ amsiInitFailed
|
||||||
|
|
||||||
- **`Download-Cradles-Oneliners.md`** - Various Powershell Download Cradles purposed as one-liners ([gist](https://gist.github.com/mgeeky/3b11169ab77a7de354f4111aa2f0df38))
|
- **`Download-Cradles-Oneliners.md`** - Various Powershell Download Cradles purposed as one-liners ([gist](https://gist.github.com/mgeeky/3b11169ab77a7de354f4111aa2f0df38))
|
||||||
|
|
||||||
|
- **`ElusiveMice`** - Cobalt Strike's User-Defined Reflective Loader with AV/EDRs evasion in mind. Utilizes AMSI, ETW and WLDP (Windows Lockdown Policy) memory patches that thwart some optics monitored by EDRs.
|
||||||
|
|
||||||
- **`Export-ReconData.ps1`** - Powershell script leveraging [PowerSploit Recon](https://github.com/PowerShellMafia/PowerSploit) module (PowerView) to save output from Reconnaissance cmdlets like `Get-*`, `Find-*` into _Clixml_ files. Those files (stored in an output directory as separate XML files) can later be extracted from attacked environment and loaded to a new powershell runspace using the same script. Very useful when we want to obtain as many data as possible, then exfiltrate that data, review it in our safe place and then get back to attacked domain for lateral spread. **Warning**: Be careful though, as this script launches many reconnaissance commands one by one, this WILL generate a lot of noise. Microsoft ATA for instance for sure pick you up with _"Reconnaissance using SMB session enumeration"_ after you've launched `Invoke-UserHunter`.
|
- **`Export-ReconData.ps1`** - Powershell script leveraging [PowerSploit Recon](https://github.com/PowerShellMafia/PowerSploit) module (PowerView) to save output from Reconnaissance cmdlets like `Get-*`, `Find-*` into _Clixml_ files. Those files (stored in an output directory as separate XML files) can later be extracted from attacked environment and loaded to a new powershell runspace using the same script. Very useful when we want to obtain as many data as possible, then exfiltrate that data, review it in our safe place and then get back to attacked domain for lateral spread. **Warning**: Be careful though, as this script launches many reconnaissance commands one by one, this WILL generate a lot of noise. Microsoft ATA for instance for sure pick you up with _"Reconnaissance using SMB session enumeration"_ after you've launched `Invoke-UserHunter`.
|
||||||
|
|
||||||
|
|
|
@ -1 +1 @@
|
||||||
Subproject commit 6989ca299040554508be22da70a2159f11226f38
|
Subproject commit 2a6f5ee44ecce877224853d531eaf5f7642b2675
|
Loading…
Reference in New Issue