From f00d3a3c048cc6527aa639b89f7dac632a03e0b9 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Wed, 18 Nov 2020 22:41:23 +0700 Subject: [PATCH] Add mdsecactivebreach/RegistryStrikesBack --- Offensive.md | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/Offensive.md b/Offensive.md index 8090b88..d931d1a 100644 --- a/Offensive.md +++ b/Offensive.md @@ -716,13 +716,21 @@ Some tools can be categorized in more than one category. But because the current A wanna be swiss army knife for data encryption, exfiltration and covert communication. - hackerschoice/gsockethackerschoice/gsocket + hackerschoice/gsocket Global Socket. Moving data from here to there. Securely, Fast and trough NAT/Firewalls + + hackerschoice/gs-transfer + Secure File Transfer via Global Socket Bounce Network + m57/dnsteal DNS Exfiltration tool for stealthily sending files over DNS requests. + + mdsecactivebreach/RegistryStrikesBack + RegistryStrikesBack allows a red team operator to export valid .reg files for portions of the Windows Registry via a .NET assembly that should run as a standard user. It can be useful in exfiltrating config files such as to support actions like are described in the "Segmentation Vault" article on the MDSec Blog. + pentestpartners/PTP-RAT Exfiltrate data over screen interfaces. For more information.