References
1- incognito
3- Shellter
5- SAM database
7- Reg Command
8- Mimikatz
10- Wdigest
11- WCE
12- WMIC
13- Veil Framework
14- PTES: Pillaging
16- Linux Pillaging
17- OSX Pillaging
22- Nirsoft
23- DLL Preloading
24- DLL Search Order
26- DLL planting
27- DLL hijacking vulnerable apps
28- Pass the Hash
29- Slack Client DLL Hijacking
30- Process Monitor
Last updated
Was this helpful?