From 2c088ed42d8e2c892e76b064643455d270261337 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Mon, 9 Sep 2019 17:56:30 +0700 Subject: [PATCH] Post Exploitation > sud0woodo/DCOMrade --- README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/README.md b/README.md index 97a59fe..bd7557c 100644 --- a/README.md +++ b/README.md @@ -1336,6 +1336,10 @@ This repository is created as an online bookmark for useful links, resources and DanMcInerney/icebreaker Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment + + sud0woodo/DCOMrade + Powershell script for enumerating vulnerable DCOM Applications + eladshamir/Internal-Monologue Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS