Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Gentlecloud Protection | Yes | 2026-05-15T17:48:04 | nginx |
tezwsse5czllksjb7cwp65rvnk4oobmzti2znn42i43bjdfd2prqqkad.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
ADFind
BloodHound
Censys
CertiHound
MANSPIDER
PowerZure
Shodan
gogo scanner
ldapdomaindump
|
AnyDesk
|
EDRStartupHinder
GFreeze
GLinker
|
DumpBrowserSecrets
Hydra
KslDump
KslKatz
XenAllPasswordPro
|
Custom Go Locker (Windows/Linux/NAS)
NetExec (nxc)
PetitPotam
PrivHound
RegPwn
RelayKing
Responder
TrustedSec Titanis
Velociraptor
ZeroPulse
ntlmrelayx
|
Chisel-ng
ProxyChains
Tor / Onion C2
openconnect
|
|
rclone
|
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|---|---|---|
| Valid Accounts | Windows Management Instrumentation | Create Account | Exploitation for Privilege Escalation | Obfuscated Files or Information | OS Credential Dumping | Remote System Discovery | Remote Services | Data from Local System | Exfiltration Over Alternative Protocol | Application Layer Protocol | Data Encrypted for Impact |
| Valid Accounts: Domain Accounts | Command and Scripting Interpreter | Create or Modify System Process | Forced Authentication | Indicator Removal | Brute Force | Network Service Discovery | Remote Services: Remote Desktop Protocol | Data from Network Shared Drive | Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Application Layer Protocol: Web Protocols | Service Stop |
| External Remote Services | Command and Scripting Interpreter: PowerShell | Boot or Logon Autostart Execution | Adversary-in-the-Middle | Proxy | Unsecured Credentials | Permission Groups Discovery | Remote Services: SMB/Windows Admin Shares | Data Staged | Transfer Data to Cloud Account | Remote Access Software | Inhibit System Recovery |
| Exploit Public-Facing Application | Command and Scripting Interpreter: Windows Command Shell | Modify Registry | Credentials from Password Stores | Account Discovery | Remote Services: SSH | Data Staged: Local Data Staging | Protocol Tunneling | Defacement | |||
| Phishing | Software Deployment Tools | Domain Policy Modification: Group Policy Modification | Account Discovery: Domain Account | Remote Service Session Hijacking | Email Collection | Encrypted Channel | |||||
| Impair Defenses | Domain Trust Discovery | ||||||||||
| Impair Defenses: Disable or Modify Tools | Cloud Service Discovery |