Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
No | 2026-04-28T07:24:57 |
xfr3txoorcyy7tikjgj5dk3rvo3vsrpyaxnclyohkbfp3h277ap4tiad.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
AdFind
Advanced IP Scanner
Bloodhound
PingCastle
PowerView
ShareFinder
|
|
|
Mimikatz
ProcDump
|
Cobalt Strike
Metasploit
Meterpreter
PowerSploit
|
|
PsExec
WMIC
|
WinSCP
|
| Initial Access | Execution | Defense Evasion | Credential Access | Discovery | Lateral Movement | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|
| Drive-by Compromise | Command and Scripting Interpreter: PowerShell | Signed Binary Proxy Execution: Rundll32 | OS Credential Dumping: LSASS Memory | Remote System Discovery | Remote Services: Remote Desktop Protocol | Exfiltration Over Web Service | Application Layer Protocol: Web Protocols | Data Encrypted for Impact |
| Exploit Public-Facing Application | Exploitation for Client Execution | Disable or Modify Tools | Network Service Discovery | Remote Services: SMB/Windows Admin Shares | Inhibit System Recovery | |||
| Phishing: Spearphishing Attachment |