The Real Hugo
Enumeration
Containers
Docs
Network_scanners
Windows
Exploit
CPUs
Binaries
Dns
Hashes
Imagemagick
Java
Level3_hypervisor
Linux
MacOS
Network
Padding
Python
Samba
Sqli
Ssl_tls
Web
Windows
Portable Executables
Dll_hijacking
Docs
Macros
Payloads
Print_nightmare
Process_injection
Service_escalation
Zero_logon
Yaml
Forensics
Hashes
Persistence
Post exploitation
Seatbelt
Bc_security
Docs
- pivoting
Priv_esc
Docs
Kernel-exploits
Privesc-scripts
Suid
Reverse engineering
Reverse shells
Applocker
- Ruleset/policy for files and directories
- Config file is
secpol.msc
- Sysadmins may create rules and push them to devices on the network.
Categories
Executable Rules
, Determines what executables and applications can be run from specified directories.
Windows Installer Rules
, Determines what Installers can be run
Script Rules
, Determines what and where scripts can be run
Packaged app Rules
, Determines what pre-packaged Windows applications can be run
Bypass