Category: Exploitation

NAT Slipstreaming

NAT Slipstreaming: bypassing the victim’s NAT/firewall

NAT Slipstreaming NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall (arbitrary firewall pinhole control), just by the victim visiting a website. NAT Slipstreaming...

CIMplant

CIMplant: C# port of WMImplant

CIMplant C# port of WMImplant which uses either CIM or WMI to query remote systems. It can use provided credentials or the current user’s session. Note: Some commands will use PowerShell in combination with...

polyglot payload generator

SNOWCRASH: polyglot payload generator

SNOWCRASH – polyglot payload generator SNOWCRASH creates a script that can be launched on both Linux and Windows machines. Payload selected by the user (in this case combined Bash and Powershell code) is embedded...