mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-24 05:15:26 +00:00
6584df310f
Add example to `disable windows defender` which uses MpCmdRun.exe to reset the current definitions. I recently used this and it was sufficient, that defender did not recognize previously flagged malicious files. It is quite helpful in case, that Set-MpPreference is not present or that the attacker is not allowed to adjust the service. |
||
---|---|---|
.. | ||
Active Directory Attack.md | ||
Bind Shell Cheatsheet.md | ||
Cloud - AWS Pentest.md | ||
Cloud - Azure Pentest.md | ||
Cobalt Strike - Cheatsheet.md | ||
Container - Docker Pentest.md | ||
Escape Breakout.md | ||
Hash Cracking.md | ||
Linux - Persistence.md | ||
Linux - Privilege Escalation.md | ||
Metasploit - Cheatsheet.md | ||
Methodology and enumeration.md | ||
Miscellaneous - Tricks.md | ||
MSSQL Server - Cheatsheet.md | ||
Network Discovery.md | ||
Network Pivoting Techniques.md | ||
Office - Attacks.md | ||
Reverse Shell Cheatsheet.md | ||
Subdomains Enumeration.md | ||
Windows - AMSI Bypass.md | ||
Windows - Download and Execute.md | ||
Windows - Mimikatz.md | ||
Windows - Persistence.md | ||
Windows - Post Exploitation Koadic.md | ||
Windows - Privilege Escalation.md | ||
Windows - Using credentials.md |