c1b3r-n0t3s
search
⌘Ctrlk
Github
c1b3r-n0t3s
  • HOME
  • c1b3r-n0t3s
  • notes
    • Crack zip files
    • Crack Password Hashes (Sites) 🤡
    • Docker Hacking 🐳
    • Esoteric languages 💢
    • Login without password to FTP
    • File Sharing 🌶️
    • File uploading malware 🫨
    • Complete list of HTTP Status Codes
    • Import a .asc key 🪡
    • JWT tokens 🐧
    • Kernel exploitation 🍀
    • LFI 🎃
    • MongoDB 🥒
    • Mysql 🫖
    • How to deal with a Redis database?
    • Reverse shells 👾
    • SMB 🐿
    • SSH 🔓
    • Spectrograms 🥠
    • Investigate image metadata
    • Strange privesc on Linux 🍄
    • Subdomain enumeration 🌞
    • Tools webpages
    • Translation and Shifting (Format encoding) 🥭
    • Turn usb into rubber ducky 🐥
    • Useful scripts 🌊
    • Web Enumeration 🐏
    • WiFi Hacking 🌐
    • Wordpress 🍔
    • XSS attacks 💀
    • Burp Suite 🏀
    • Exploits
    • Introduction to Web Hacking 😀
    • Linux things 🟢
    • Metasploit 💦
    • Network Security 🩻
    • Privilege Escalation 🧊
    • Protocols 🌧
    • Tools 🛠
    • Vunerability research 🦑
    • Windows things 🔵
    • img
    • Red Teaming 🎈
      • Fundamentals 📝
      • Initial Access ✂️
        • Password Attacks 📧
        • Phishing 🐟
        • Red Team Recon 🐦
        • Weaponization ⚔️
          • An HTML Application (HTA) 💉
          • Command and Control (C2 or C&C) 🧬
          • Delivery Techniques
          • Introduction 🧿
          • Powershell (PSH) 🎁
          • Visual Basic for Application (VBA)
          • Windows Scripting Host (WSH) 🪤
      • Post Compromise 🤬
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. noteschevron-right
  2. Red Teaming 🎈chevron-right
  3. Initial Access ✂️

Weaponization ⚔️

An HTML Application (HTA) 💉chevron-rightCommand and Control (C2 or C&C) 🧬chevron-rightDelivery Techniqueschevron-rightIntroduction 🧿chevron-rightPowershell (PSH) 🎁chevron-rightVisual Basic for Application (VBA)chevron-rightWindows Scripting Host (WSH) 🪤chevron-right

Last updated 2 years ago