You've gained Domain Admin privileges, but an EDR is blocking your attempts to dump the entire domain's hashes.
In this article, I'll share a technique I used to bypass this obstacle.
medium.com/@0xcc00/bypass…
New quick article, Hiding behind the library line - Go malware development
It's about exploring a technique of hiding your malicious code inside Go libraries to mislead analysts and reverse engineers.
link: medium.com/@0xcc00/hiding…
Drama++
The United States government is using a fork of Signal called "TM SGNL". TM SGNL is (likely) produced by an Israeli firm (Smarsh) which is (or related to in some capacity) the Israel Defense Forces' Intelligence unit. Although these claims are based on self-described
The new AI tool from google (Gemini-cli) performs impressively well. Here, I made it perform a simple internal penetration test by having it control a C2 beacon (Sliver) through an MCP server, and gave it access to Netexec and Hashcat
I may write a blog about it if I continue it
I've been playing with MCP, Releasing AdaptixC2_mcp a PoC that exposes Adaptix-C2 APIs to gemini-cli, enabling it to control a beacon and to simulate a threat actor behavior.
Code: github.com/0xb11a1/Adapti…