Commit Graph

3980 Commits

Author SHA1 Message Date
Brendan Malone df67a8aa4d Fixed not compiling 2022-06-03 10:23:25 -05:00
Brendan Malone 3e36aa671f MacOS Dylib injection for T1574.006
reference: https://cedowens.medium.com/taking-esf-for-a-nother-spin-6e1e6acd1b74
2022-06-02 14:57:35 -05:00
Brendan Malone 7748526bd4 C file for opening calc 2022-06-02 14:56:00 -05:00
Atomic Red Team GUID generator 5b1111f223 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-06-01 20:32:51 +00:00
Bhavin Patel a42be924d6 Merge pull request #1983 from javery-sysdig/patch-2
Create T1611.002.yaml "Escape to Host"
2022-06-01 13:32:12 -07:00
Bhavin Patel fa3a182989 Merge branch 'master' into patch-2 2022-06-01 13:30:54 -07:00
Atomic Red Team doc generator 3b83031d25 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-31 17:14:18 +00:00
Atomic Red Team GUID generator cc5498aee5 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-31 17:14:13 +00:00
Bhavin Patel 5c7c272b82 Merge pull request #1981 from Leomon5/patch-14
Adding T1110.003 Test 7 - Password Spray with MSOLSpray
2022-05-31 10:13:40 -07:00
Bhavin Patel 0d57af5887 Merge branch 'master' into patch-14 2022-05-31 10:12:43 -07:00
Atomic Red Team doc generator a111959d19 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-25 04:21:58 +00:00
Atomic Red Team GUID generator d9b7195f86 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-25 04:21:53 +00:00
IT-Native c02ec5c36e Changes file extension of Test 1195 so that the file is detected and … (#1982)
* Changes file extension of Test 1195 so that the file is detected and there is no error anymore

* Update T1195.yaml

Co-authored-by: Georg Schlagholz <georg.schlagholz@it-native.com>
Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-24 22:21:26 -06:00
Atomic Red Team doc generator a888e0e7c9 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-25 04:12:17 +00:00
Atomic Red Team GUID generator a8f00eb241 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-25 04:12:12 +00:00
frack113 af529da1e5 Add lolbin (#1979) 2022-05-24 22:11:43 -06:00
Jason Avery be60206066 Create T1611.002.yaml "Escape to Host"
Fairly straight forward way to escape a privileged docker container and compromise the host once getting root on the container.
2022-05-24 11:16:30 -05:00
Leo Verlod 322f6843fa Adding T1110.003 Test 7 - Password Spray with MSOLSpray 2022-05-23 23:44:09 -05:00
Atomic Red Team doc generator 9e8bb918d5 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-19 23:05:53 +00:00
Atomic Red Team GUID generator 7846e9770a Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-19 23:05:48 +00:00
Carrie Roberts 908924d51f add a lightweight password spray test (#1978) 2022-05-19 17:05:21 -06:00
Atomic Red Team doc generator ebfc28708d Generated docs from job=generate-docs branch=master [ci skip] 2022-05-17 22:48:32 +00:00
Carrie Roberts c171910f63 typo fix (#1973) 2022-05-17 16:48:04 -06:00
Atomic Red Team doc generator 2007ac5d8d Generated docs from job=generate-docs branch=master [ci skip] 2022-05-17 22:25:12 +00:00
Atomic Red Team GUID generator a204b5bcfb Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-17 22:25:08 +00:00
Jesse Moore 0ba9c7ec9e Challenge Bounty T1615 LOL-cmdlet Get-GPO cmdlet (#1966)
* ChallengeBounty T1615 LOLB Get-GPO cmdlet

* Added changes 

Took out variableInput and put in $ENV:userdnsdomain, on attack command also made the CheckPreqs say people need to install RSAT manually for GroupPolicy and ActiveDirectory. The cleanUp command won't take those RSAT modules out, but instead will remove the gpo_output file.  The GetPrereq might need a little work but shouldn't need it..... since the -CheckPrereq says to Manually install on Windows 10. Hope that works out.

* Update T1615.yaml

Glad you showed me the PreReq "if" command trick, I would of struggled with it, thank you. Thanks for pointing out the GetPreqs need to be in there separate areas, I don't think I've had to do that before. Ya, glad you had me look more into getting the Win10 to work; I was just going for win server but its nice to have both as an option, thanks for kindly suggesting.

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-17 16:24:48 -06:00
Atomic Red Team doc generator 086eb73ee8 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-17 16:51:43 +00:00
Atomic Red Team GUID generator 6dffd90b7f Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-17 16:51:38 +00:00
Leo Verlod df1f3bf6ce Create T1560.003 Test 1 (#1967)
* Create T1560.003 test 1

* Add T1048.003 Test 6

* Delete T1560.003 (moved to T1048.003

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-17 10:51:09 -06:00
Atomic Red Team doc generator 989bef284b Generated docs from job=generate-docs branch=master [ci skip] 2022-05-17 00:07:30 +00:00
Atomic Red Team GUID generator 351ee2e429 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-17 00:07:25 +00:00
Leo Verlod f949628243 Adding T1555.003 Test 14 - Chrome Login Data Access (MacOS) (#1965)
Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-16 18:07:01 -06:00
Atomic Red Team doc generator 4c969327d5 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-16 14:38:51 +00:00
Jason Avery d6158d5f8d Fix T1574.006-1 CleanUp (#1968)
Fix sed syntax to properly remove the test library from ld.so.preload.
2022-05-16 08:38:18 -06:00
Atomic Red Team doc generator ef93c45591 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-13 01:57:09 +00:00
Atomic Red Team GUID generator db49bd847c Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-13 01:57:04 +00:00
tlor89 73f3c752a4 Update T1555.003.yaml (#1949)
* Update T1555.003.yaml

Loot local Credentials - Invoke-WCMDump technique via function of WinPwn

* Update T1555.003.yaml

added mimi-kittenz for extracting juicy info from memory and Sharpweb gathering Browser Credentials

* Update T1555.003.yaml

update

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 19:56:38 -06:00
Atomic Red Team doc generator 812f7dcbaa Generated docs from job=generate-docs branch=master [ci skip] 2022-05-13 01:56:04 +00:00
Atomic Red Team GUID generator b3ab708511 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-13 01:56:00 +00:00
tlor89 3b2e6e7404 Update T1003.002.yaml (#1963)
* Update T1003.002.yaml

add Loot local Credentials - Dump SAM-File for NTLM Hashes technique via function of WinPwn

* Update T1003.002.yaml

updated

* Update T1003.002.yaml

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 19:55:35 -06:00
Atomic Red Team doc generator 574a81359d Generated docs from job=generate-docs branch=master [ci skip] 2022-05-13 01:21:21 +00:00
Atomic Red Team GUID generator adebeb27d1 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-13 01:21:16 +00:00
tlor89 b384c8b7ab Update T1555.yaml (#1948)
* Update T1555.yaml

Loot local Credentials - Invoke-WCMDump technique via function of WinPwn
Loot local Credentials - Wifi Credentials technique via function of WinPwn
Loot local Credentials - Decrypt Teamviewer Passwords technique via function of WinPwn

* Update T1555.yaml

added name: powershell

* Update T1555.yaml

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 19:20:49 -06:00
Atomic Red Team doc generator 15fd6519a6 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-13 00:48:10 +00:00
Atomic Red Team GUID generator 2d71495086 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-13 00:48:05 +00:00
tlor89 2174daa254 Update T1555.004.yaml (#1964)
Loot local Credentials - Invoke-WCMDump technique via function of WinPwn
2022-05-12 18:47:41 -06:00
Atomic Red Team doc generator cb9c677fa0 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-12 23:56:33 +00:00
Atomic Red Team GUID generator 677a1b13ef Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-12 23:56:27 +00:00
tlor89 576d3b2880 Update T1055.001.yaml (#1950)
Get SYSTEM shell - Bind System Shell using UsoClient DLL load technique via function of WinPwn

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 17:55:59 -06:00
Atomic Red Team doc generator 9906df5fe8 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-12 23:54:23 +00:00