Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
No | 2026-04-28T07:23:34 |
darksidc3iux462n6yunevoag52ntvwp6wulaz3zirkmh4cnz6hhj7id.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
ADRecon
AdFind
Advanced IP Scanner
SoftPerfect NetScan
|
AnyDesk
GoToAssist
TightVNC
|
|
Mimikatz
SessionGopher
|
Cobalt Strike
CrackMapExec
Impacket
PowerSploit
|
Plink
|
PsExec
|
Bashupload
MEGA
RClone
Sendspace
pCloud
|
| Initial Access | Execution | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|---|---|
| Valid Accounts | Windows Management Instrumentation | Exploitation for Privilege Escalation | Obfuscated Files or Information | OS Credential Dumping: LSASS Memory | Network Service Discovery | Remote Services: Remote Desktop Protocol | Archive Collected Data: Archive via Utility | Exfiltration Over Web Service: Exfiltration to Cloud Storage | Application Layer Protocol: Web Protocols | Data Encrypted for Impact |
| Exploit Public-Facing Application | Command and Scripting Interpreter: PowerShell | Disable or Modify Tools | OS Credential Dumping: NTDS | Domain Trust Discovery | Remote Services: SMB/Windows Admin Shares | Remote Access Software | Service Stop | |||
| Inhibit System Recovery |