Behavioral task
behavioral1
Sample
7a0d8cd264b45f09fda5361e6ee27c785bdc43602ab6a7f4f902f25743e608f0.pdf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a0d8cd264b45f09fda5361e6ee27c785bdc43602ab6a7f4f902f25743e608f0.pdf
Resource
win10v2004-20220901-en
General
-
Target
7a0d8cd264b45f09fda5361e6ee27c785bdc43602ab6a7f4f902f25743e608f0
-
Size
53.9MB
-
MD5
2673c8217685d55c904efdc86ad57c4b
-
SHA1
be6d0c52b88df321f0a89564719132725c950742
-
SHA256
7a0d8cd264b45f09fda5361e6ee27c785bdc43602ab6a7f4f902f25743e608f0
-
SHA512
752fd941f89d7b1388e0ec624d9aa0901ee6c22fbcb6bc564fdb0fa21f67c1c2b34f5bc8a4bb3c017105f3b35be94db97f0233a3fce55be6b3f6c1dfdd8a02cb
-
SSDEEP
1572864:8yr/nFG3lpvnTjanp4PBztmRm4BckHHtJm:HG33an9vdtM
Malware Config
Signatures
Files
-
7a0d8cd264b45f09fda5361e6ee27c785bdc43602ab6a7f4f902f25743e608f0.pdf
-
https://www.vulnhub.com/
-
https://blog.csdn.net/weixin_44214107
-
https://blog.csdn.net/weixin_44214107,
-
https://github.com/sqlmapproject/sqlmap/issues/619
-
https://bbs.ichunqiu.com/thread-29736-1-1.html
-
https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/#method1pythonptymodule
-
https://github.com/rebootuser/LinEnum
-
https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_-_linux.html
-
https://www.freebuf.com/articles/system/149118.html
-
https://www.securusglobal.com/community/2014/03/17/how-i-got-root-with-sudo/
-
https://github.com/sleventyeleven/linuxprivchecker/blob/master/linuxprivchecker.py
-
https://www.vulnhub.com/entry/ai-web-2,357/
-
https://raw.githubusercontent.com/danielmiessler/SecLists/master/Passwords/Leaked-Databases/rockyou-45.txt
-
https://github.com/maurosoria/dirsearch
-
https://www.cnblogs.com/pipelone/archive/2009/04/17/1437879.html
-
https://github.com/saghul/lxd-alpine-builder
-
https://blog.csdn.net/xiongchun11/article/details/78832947
-
https://www.vulnhub.com/entry/bossplayersctf-1,375/
-
https://www.vulnhub.com/entry/bottleneck-1,374/
-
https://www.secpulse.com/archives/75491.html
-
https://xz.aliyun.com/t/2289https://xz.aliyun.com/t/2289
-
http://www.moonsec.com/post-717.html
-
https://www.cnblogs.com/heycomputer/articles/10537633.html
-
https://intx0x80.blogspot.com/2017/05/python-input-vulnerability_25.html
-
https://www.fengdingbo.com/netcat-invalid-option-e.html
-
https://superuser.com/questions/691008/why-is-the-e-option-missing-from-netcat-openbsd
-
https://github.com/sleventyeleven/linuxprivchecker
-
https://github.com/jivoi/pentest/blob/master/shell/rootshell.c
-
https://www.vulnhub.com/entry/bulldog-1,211/
-
https://www.cmd5.com/
-
https://www.somd5.com/
-
https://blog.csdn.net/jixieyang3701/article/details/79410725
-
https://www.vulnhub.com/entry/dc-7,356/
-
https://github.com/droope/droopescan
-
https://github.com/immunIT/drupwn
-
https://www.sevenlayers.com/index.php/164-drupal-to-reverse-shell
-
https://www.drupal.org/node/2088811
-
http://drupal.org/project/php
-
https://github.com/Green-m/msfvenom-zsh-completion
-
https://www.vulnhub.com/entry/dc-1,292/
-
http://sh1yan.top/2019/07/28/MSF-Command-Notes/
-
https://xz.aliyun.com/t/4008
-
https://www.howtoing.com/a-beginner-s-guide-to-drush-the-drupal-shell
-
https://www.vulnhub.com/entry/dc-8,367/
-
https://blog.csdn.net/weixin_44214107/article/details/101123371
-
https://www.exploit-db.com/exploits/46996
-
https://stackoverflow.com/questions/14219092/bash-script-and-bin-bashm-bad-interpreter-no-such-file-or-directory
-
https://www.vulnhub.com/entry/digitalworldlocal-joy,298/
-
https://www.vulnhub.com/entry/djinn-1,397/
-
http://imhuchao.com/323.html
-
https://github.com/swisskyrepo/PayloadsAllTheThings
-
https://xz.aliyun.com/t/3918
-
https://www.geeksforgeeks.org/vulnerability-input-function-python-2-x/
-
https://www.vulnhub.com/entry/dpwwn-1,342/
-
https://www.vulnhub.com/entry/dpwwn-2,343/
-
https://www.vulnhub.com/entry/evm-1,391/
-
https://blog.csdn.net/weixin_44214107/article/details/103267896
-
https://www.vulnhub.com/entry/gears-of-war-ep1,382/
-
https://www.4hou.com/penetration/11674.html
-
https://xz.aliyun.com/t/2333
-
https://gtfobins.github.io/gtfobins/awk/#limited-suid
-
https://gtfobins.github.io/gtfobins/vim/#limited-suid
-
https://www.vulnhub.com/entry/goldeneye-1,240/
-
https://www.iteye.com/blog/fs-9527-1336675
-
https://www.vulnhub.com/entry/ha-isro,376/
-
https://github.com/danielmiessler/SecLists
-
https://www.exploit-db.com/papers/12886
-
https://nosec.org/home/detail/2155.html
-
https://www.hackingarticles.in/rce-with-lfi-and-ssh-log-poisoning/
-
https://outpost24.com/blog/from-local-file-inclusion-to-remote-code-execution-part-1
-
https://rawsec.ml/en/local-file-inclusion-remote-code-execution-vulnerability/
-
https://github.com/truongkma/ctf-tools/blob/master/John/run/truecrypt2john.py
-
https://www.veracrypt.fr/en/Downloads.html
-
https://www.hackingarticles.in/ha-isro-vulnhub-walkthrough/
-
https://www.vulnhub.com/entry/ha-wordy,363/
-
https://www.exploit-db.com/exploits/35543
-
https://www.vulnhub.com/entry/hacker-fest-2019,378/
-
https://www.vulnhub.com/entry/kioptrix-level-1-1,22/
-
https://www.vulnhub.com/entry/me-and-my-girlfriend-1,409/
-
https://gtfobins.github.io/gtfobins/php/#sudo
-
https://www.vulnhub.com/entry/os-hax-1,389/
-
https://download.vulnhub.com/media/os-hax/CTF.pdf
-
https://www.vulnhub.com/entry/os-hax-lab-james,392/
-
https://www.hackingarticles.in/linux-for-pentester-wget-privilege-escalation/
-
https://www.vulnhub.com/entry/prime-1,358/
-
https://blog.csdn.net/m0_37416991/article/details/93768694
-
https://github.com/OJ/gobuster
-
https://www.exploit-db.com/exploits/45058
-
https://www.devglan.com/online-tools/aes-encryption-decryption0
-
https://www.cmd5.com/hash.aspx
-
https://www.vulnhub.com/entry/serial-2,373/
-
https://github.com/BlackrockDigital
-
https://segmentfault.com/a/1190000012669267
-
http://www.xumenger.com/android-apk-20190304/
-
https://www.freebuf.com/sectool/111532.html
-
https://www.4hou.com/mobile/15600.html
-
https://juejin.im/post/5a1bcc0151882540f363460b
-
https://medium.com/@andersongomes001/vulnhub-serial-2-316e2093d0e5
-
https://www.hackingarticles.in/compressive-guide-on-file-transfer-post-exploitation/
-
https://git-scm.com/book/zh/v1/Git-%E5%9F%BA%E7%A1%80-%E6%9F%A5%E7%9C%8B%E6%8F%90%E4%BA%A4%E5%8E%86%E5%8F%B2
-
https://www.cnblogs.com/hanyifeng/p/5526799.html
-
https://www.jianshu.com/p/06474087ca71
-
https://segmentfault.com/a/1190000002789942
-
https://www.freebuf.com/articles/system/170783.html
-
http://blog.lujun9972.win/blog/2019/05/13/%E4%B8%BA%E4%BB%80%E4%B9%88%E8%AF%B4%E5%88%9B%E5%BB%BAdocker%E7%94%A8%E6%88%B7%E7%BB%84%E4%B8%8D%E6%98%AF%E4%B8%AA%E5%A5%BD%E9%80%89%E6%8B%A9/
-
http://blog.sina.com.cn/s/blog_54d63a8b0100g00i.html
-
https://zhuanlan.zhihu.com/p/31508758
-
https://zhuanlan.zhihu.com/p/37019206
-
https://zhuanlan.zhihu.com/p/23487280?utm_source=wechat_session&utm_medium=social&utm_oi=787061991805165568
-
https://zhuanlan.zhihu.com/p/23537552?utm_source=wechat_session&utm_medium=social&utm_oi=787061991805165568
-
https://wooyun.js.org/drops/Blind%20Return%20Oriented%20Programming%20(BROP)%20Attack%20-%20%E6%94%BB%E5%87%BB%E5%8E%9F%E7%90%86.html
-
https://raw.githubusercontent.com/andersongomes001/vulnhub/master/serial2/xpl.py
-
https://www.vulnhub.com/entry/sunset-nightfall,355/
-
https://www.jianshu.com/p/a84d8f26926c
-
https://shahmeeramir.com/penetration-testing-of-an-ftp-server-19afe538be4b
-
https://www.hackingarticles.in/6-ways-to-hack-ftp-login-password/
-
https://wsgzao.github.io/post/ssh/
-
https://www.vulnhub.com/entry/symfonos-2,331/
-
https://www.exploit-db.com/exploits/36742
-
https://github.com/t0kx/exploit-CVE-2015-3306
-
https://github.com/chcx/cpx_proftpd/
-
https://null-byte.wonderhowto.com/how-to/crack-shadow-hashes-after-getting-root-linux-system-0186386/
-
https://www.ssh.com/ssh/tunneling/example
-
https://gtfobins.github.io/
-
https://www.vulnhub.com/entry/symfonos-3,332/
-
https://www.cnblogs.com/iamstudy/articles/CVE-2014-6271_shellshock.html
-
https://www.4hou.com/vulnerable/12984.html
-
https://www.freebuf.com/news/48331.html
-
https://www.freebuf.com/articles/system/48357.html
-
https://github.com/DominicBreuker/pspy
-
https://www.vulnhub.com/entry/tr0ll-1,100/
-
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md
-
https://www.vulnhub.com/entry/ua-literally-vulnerable,407/
-
https://www.cnblogs.com/siqi/p/3604354.html
-
https://www.vulnhub.com/entry/view2akill-1,387/
-
https://www.exploit-db.com/exploits/47323
-
https://github.com/lijiejie/GitHack
-
https://www.exploit-db.com/exploits/47324
-
https://github.com/mzfr/vulnhub-writeups/blob/master/2019-11-16-view2kill.md
-
https://www.vulnhub.com/entry/wtf-1,399/
-
https://www.cnblogs.com/LittleHann/p/3735602.html
- Show all
-