Detectar la versión de WordPress leyendo desde un fichero cada dominio en PowerShell

Process Monitor v3.32

Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity. It combines the features of two legacy Sysinternals utilities, Filemon and Regmon, and adds an extensive list of enhancements including rich and non-destructive filtering, comprehensive event properties such session IDs and user names, reliable process information, full thread stacks with integrated symbol support for each operation, simultaneous logging to a file, and much more. Its uniquely powerful features will make Process Monitor a core utility in your system troubleshooting and malware hunting toolkit.

For more information

https://technet.microsoft.com/en-us/sysinternals/processmonitor.aspx

Cambiar el User-Agent en PowerShell

Leer artículos de la Wikipedia mediante la voz del Sistema Operativo con PowerShell

Faraday v2.4: Collaborative Penetration Test and Vulnerability Management Platform

Faraday Client is the software which will allow you to work with your favorite security tools and capture their output in an organized manner. It works under a GTK+3 interface with the popular VTE terminal with a custom ZSH shell that respects the user’s configuration (yes, that means you get to keep your exact ZSH terminal inside Faraday, even if you use ZPrezto or Oh My ZSH).

Quick install

Download the latest tarball or clone the Faraday Git Project:

Plugins

Faraday plays well with others, right now it has more than 50 supported tools, among them you will find:

For more information

https://github.com/infobyte/faraday/

Automatizar SDRSharp con PowerShell (parte 5)

Abrir, ocultar el menú, poner en funcionamiento SDRSharp y recorrer el rango de frecuencias desde 400~470 MHz haciendo una captura de pantalla por cada frecuencia

Analizar con Cheat Engine un payload de ejecución de comandos arbitrarios para ejecutar PowerShell

Script para cargar en memoria y ejecutar un payload de ejecución de comandos arbitrarios en PowerShell

Direcciones utilizadas para cargar la shellcode con el payload

Analizar con Cheat Engine el payload de ejecución de comandos arbitrarios cargado en PowerShell

Relación entre la shellcode y la carga en memoria desde Cheat Engine