12.9K subscribers
550 photos
27 videos
24 files
890 links
This channel discusses:

— Offensive Security
— RedTeam
— Malware Research
— OSINT
— etc

Disclaimer:
t.me/APT_Notes/6

Chat Link:
t.me/APT_Notes_PublicChat
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
🔑 Extracting Credentials from Chrome Memory

An excellent study on how Chrome's memory works and how to extract credentials, cookies, etc. in а low privileges plain text format.

https://www.cyberark.com/resources/threat-research-blog/extracting-clear-text-credentials-directly-from-chromium-s-memory

#chrome #memory #dump #creds
👍10🔥5
Forwarded from Ralf Hacker Channel (Ralf Hacker)
Для дампа памяти процессов, защищённых PPL.
Работает с Windows 11 25346.1001 (April 2023).

https://github.com/gabriellandau/PPLFault

#creds #git #soft
👍6
Forwarded from Ralf Hacker Channel (Ralf Hacker)
Для получения паролей пользователей SSH в открытом виде

https://github.com/jm33-m0/SSH-Harvester

#redteam #pentest #creds #git
🔥10
Forwarded from Ralf Hacker Channel (Ralf Hacker)
Набор инструментов для удалённого дампа паролей.

https://github.com/Slowerzs/ThievingFox/

Ну и сам блог:
https://blog.slowerzs.net/posts/thievingfox/

#pentest #redteam #creds
🔥10
This media is not supported in your browser
VIEW IN TELEGRAM
🔑 RdpStrike

The project aims to extract clear text passwords from mstsc.exe, and the shellcode uses Hardware Breakpoint to hook APIs. It is a complete positional independent code, and when the shellcode injects into the mstsc.exe process, it is going to put Hardware Breakpoint onto three different APIs, ultimately capturing any clear-text credentials and then saving them to a file.

🔗 Source:
https://github.com/0xEr3bus/RdpStrike

#rdp #creds #bof #cobaltstrike
👍9❤‍🔥73👎2