Hugo Perinazzo

        • openssl
        • python tips
                • daemons and services
                • TLS analysis
              • Acquisition
              • Browser
              • CryptoLuks
              • Détournement de processus
              • DNS
              • Droppers
              • Explore the $MFT
              • Fast Forensics
              • Logs
              • Macro VBA
              • MemprocFS
              • Mounting disks
              • NTFS specials files
              • Online cheatsheet
              • Plaso
              • RAM capture
              • RecentFiles, Jumplist, Recyclebin
              • Setup ELK
              • ShadowVolumes
              • Timeline
              • Volatility3
              • Web navigation
              • Windows memory, process, and Executive Objects
              • packedBinaries
            • Unpacking
            • FSNotify technology on linux
            • Hardening linux
            • How EDR detection work on windows
            • Bloodhound
            • ElasticSearch
            • F2ECS
            • main
            • mounting disk
            • Querying the AD
            • Redo AD LDS on windows server 2019
            • Setup AD LDS on win10
            • timesketch
            • ReverseEngineering
            • reversing executable made with pyhon
          • Révisions
          • Password_guessing
          • Tools
              • Tools
              • Working-with-TGT
              • asreproasting
              • kerberoasting
                  • DC-Accessing-CA
                  • DC-List-Certificates-Templates
                  • DC-New-certificate-template
                  • workstation-Accessing-CA
                  • Workstation-Request-a-certificate
                  • Certify
                    • Definition
                    • Detection_prevention_remediation
                    • Exploitation
                    • Definition
                    • Detection_prevention_remediation
                    • Exploitation
                    • Exploitation
                  • Requierements
                • ADCS
                  • Kerbrute
                  • Rubeus
            • TODO
            • AMSI Bypass
            • AMSI Evasion
            • AV Evasion
            • Crypter
            • Crypter FUD fait par BARD
            • Injection techniques
            • BadUsb
            • Choose a hacking computer
            • Pivoting and PortForwarding
            • evasion
            • run
              • Covenant
              • Designing implant
            • Google dorking
            • MISP
            • Proxychains and anonsurf
            • RAT
            • Sandboxes
            • Serveur C2
            • shellcode
              • HowToEnableRDP
              • metasploit rdp
              • metasploit vnc
              • rustdesk
                • Run on boot
                • Scheduled
                • LNK poisoning
                • RDP
                • Run on boot
                • Scheduled tasks
                • Services
              • Resources
              • Velociraptor
            • PostExploitation
            • shutdown_windows_firewall
              • LD_PRELOAD and path Hijacking
              • privesc linux
              • ask for UAC
              • services
            • PrivEsc_checklist
            • symlink
              • BOF inject shellcode
              • Diff between x86 and x64
              • example
              • find a writable location in memory
              • gdb-pwndbg
              • leak PIE
              • other tips
              • pwntool
              • ret2system
              • ROP chains
              • stack explained
            • BinaryExploitation
            • php
            • python
            • Self contained Winrar SFX archive backdoored
            • jwt
            • LFI
            • sqli
            • sqlmap over websocket
            • ssti
            • Web_checklist
            • WPA2
              • Alternate Data Stream
              • Basics
              • Change keyboard layout
              • extract_gz
              • Interact with the registry
              • sudo
            • Disable windows defender
            • Group Policies (GPO)
            • package manager
            • pwn_windows_users_methodologie
            • windows add a administrator
          • cracking
          • meterpreter
          • UpgradingStty
          • Wordlist Generation
    Home

    ❯

    Papers

    ❯

    Red

    ❯

    Other

    ❯

    Sandboxes

    Sandboxes

    Aug 10, 20241 min read

    https://github.com/cuckoosandbox/cuckoo https://cuckoosandbox.org/


    Graph View

    Backlinks

    • No backlinks found
    • Hugo Perinazzo