Pentester's Promiscuous Notebook
Twitter
GitHub
Blog
Sponsor
Search
⌃
K
Links
README
⚒️ Pentest
C2
Infrastructure
AD
ACL Abuse
AD CS Abuse
ADIDNS Abuse
Attack Trusts
Attack RODCs
AV / EDR Evasion
Authentication Coercion
Credentials Harvesting
From Memory
Credential Phishing
DCSync
DPAPI
KeePass
Linux
LSA
NetSync
NPLogonNotify
NTDS
Password Filter
RDP
RPC
SAM
SSH Clients
Discovery
DnsAdmins
Dominance
GPO Abuse
Kerberos
Key Credentials Abuse
LAPS
Lateral Movement
LDAP
NTLM
Password Spraying
Post Exploitation
Pre-created Computers Abuse
PrivExchange
Privileges Abuse
RID Cycling
SCCM / MECM Abuse
SMB
RPC
Token Manipulation
User Hunt
WSUS
Zerologon
DevOps
DBMS
Authentication Brute Force
File Transfer
IPMI
Kiosk Breakout
Low-Hanging Fruits
LPE
Networks
NFS
Persistence
Pivoting
Post Exploitation
SNMP
SSH
TFTP
VNC
Misc
OSINT
Password Brute Force
Perimeter
Shells
Web
Wi-Fi
⚔️ Red Team
Basics
Cobalt Strike
Infrastructure
Malware Development
SE
⚙️ Admin
Git
Linux
Networking
Virtualization
Windows
Powered By
GitBook
Comment on page
Credential Phishing
https://embracethered.com/blog/posts/2021/spoofing-credential-dialogs/
CredentialPhisher
https://blog.fox-it.com/2018/08/14/phishing-ask-and-ye-shall-receive/
https://github.com/fox-it/Invoke-CredentialPhisher
creds_hunt
https://github.com/0xsp-SRD/0xsp.com/tree/main/creds_hunt
Fake Logon Screen
https://github.com/bitsadmin/fakelogonscreen
https://github.com/BlacksunLabs/LockScream
Last modified
4mo ago