Category: Post Exploitation

BloodHound Attack

BARK: BloodHound Attack Research Kit

BloodHound Attack Research Kit BARK stands for BloodHound Attack Research Kit. It is a PowerShell script built to assist the BloodHound Enterprise team with researching and continuously validating abuse primitives. BARK currently focuses on...

Invisible Persistence

Suborner: The Invisible Account Forger

Suborner – A Windows Bribery for Invisible Persistence A simple program to create a Windows account you will only know about 🙂 Create invisible local accounts without net user or Windows OS user management...

Linux Credentials Dumper

pamspy: Credentials Dumper for Linux using eBPF

pamspy — Credentials Dumper for Linux pamspy leverages eBPF technologies to achieve an equivalent work of 3snake. It will track a particular userland function inside the PAM (Pluggable Authentication Modules) library, used by many...