Common Information
Type | Value |
---|---|
Value |
byt3bl33d3r |
Category | |
Type | Github Username |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2025-01-27 | 160 | 利用合法服务逃避检测的C2框架集合 | ||
Details | Website | 2025-01-06 | 9 | Comprehensive Command and Control Tools for Red Teaming Operations | ||
Details | Website | 2024-11-11 | 69 | BSides CPH 2024 Writeup: DIY Trojan horse or: How to get your malware past EDR | ||
Details | Website | 2024-10-21 | 138 | Intro to Active Directory HTB-Academy | ||
Details | Website | 2024-09-27 | 27 | WHAT’S YOURS IS MINE! Creating a Custom Remote Desktop Application to PWN Everything! | ||
Details | Website | 2023-07-14 | 23 | Top Ethical Hacking Tools For Penetration Testing | ||
Details | Website | 2022-12-20 | 22 | Use nim compiled language to evade Windows Defender reverse shell detection | ||
Details | 2022-02-01 | 130 | A New Cyber Insurance Model: Continuous Control Validation | |||
Details | Website | 2021-06-02 | 23 | Kerberos - A Domains Achille's Heel | ||
Details | Website | 2021-03-26 | 22 | Dumping LSASS in memory undetected using MirrorDump | Pen Test Partners | ||
Details | Website | 2021-03-01 | 64 | Investigation into the state of Nim malware | ||
Details | Website | 2021-03-01 | 14 | Nimar Loader | ||
Details | Website | 2019-04-16 | 39 | Red Team从0到1的实践与思考 | ||
Details | Website | 2019-03-21 | 6 | Command & Control: Silenttrinity Post-Exploitation Agent - Hacking Articles | ||
Details | 2016-10-07 | 20 | PowerPoint Presentation | |||
Details | Website | — | 243 | UNKNOWN |