In the Open
Crypto
Enumeration
Containers
Docs
Network_scanners
Windows
Exfiltration
Exploit
CPUs
Binaries
Dns
Hashes
Imagemagick
Java
Level3_hypervisor
Linux
MacOS
Network
Padding
Python
Samba
Sqli
Ssl_tls
Web
Windows
Dll_hijacking
Docs
Macros
Payloads
Print_nightmare
Process_injection
Service_escalation
Zero_logon
Yaml
Forensics
Hashes
Misc
Osint
Persistence
Post exploitation
Seatbelt
Bc_security
Docs
- pivoting
Priv_esc
Docs
Kernel-exploits
Privesc-scripts
Suid
Reverse engineering
Reverse shells
Stego
Applocker
- Ruleset/policy for files and directories
- Config file is
secpol.msc
- Sysadmins may create rules and push them to devices on the network.
Categories
Executable Rules, Determines what executables and applications can be run from specified directories.
Windows Installer Rules, Determines what Installers can be run
Script Rules, Determines what and where scripts can be run
Packaged app Rules, Determines what pre-packaged Windows applications can be run
Bypass
Social_engineering