β›ˆοΈMisc

This page contain useful Web, Linux, Windows, and Active Directory Attack Cheatsheet

AD Resource / Checklists

Windows / AD Attack Tools

This is common tools for AD / Windows exploitation. I give the keyword, Google it how to use.

  • NetExec / CrackMapExec

  • Impacket

  • Bloodhound / Sharphound /Rusthound

  • Powersploit / PowerView / PowerUp

  • GhostPack-Compiled Binaries

  • PowerUpSQL

  • UACME (for UAC bypass)

  • Mimikatz / LaZagne

  • WinPEAS / Moriarty

  • Windows Exploit Suggester - Next Generation (WES-NG)

  • GodPotato (for Impersonate PE)

Linux Attack Tools

Common tools for Linux enumeration and exploitation.

  • LinPEAS

  • pspy

  • sund3num

  • traitor

Pivoting

Common tools for pivoting. Google it.

  • chisel

  • rpivot

  • sshuttle

  • ligolo

  • ligolo-ng

Thick Client Pentest

Common tools for thick client pentesting.

Thick Client Playground:

Other Useful Checklists

Living Off The Land Projects

What is LOTL Technique?

Unlike traditional malware attacks, which leverage signature files to carry out the attack plan, LOTL attacks are fileless β€” meaning they do not require an attacker to install any code or scripts within the target system. Instead, the attacker uses tools that are already present in the environment, such as PowerShell, Windows Management Instrumentation (WMI) or the password-saving tool, Mimikatz, to carry out the attack.

Using native tools makes LOTL attacks far more difficult to detect, especially if the organization is leveraging traditional security tools that search for known malware scripts or files. Because of this gap in the security toolset, the hacker is often able to dwell undetected in the victim’s environment for weeks, months or even years.

Note: This page is incomplete and will be regularly updated. If you have any ideas or resources that need to be added, please contact me at yuyudhn@gmail.com.

Last updated