Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Royal | No | 2026-04-28T07:26:17 |
royal2xthig3ou5hd7zsliqagy6yygk2cdelaxtni2fyad6dpmpxedid.onion
|
|||
|
|
No | 2026-04-28T07:28:50 |
royal4ezp7xrbakkus3oofjw6gszrohpodmdnfbe5e4w3og5sm7vb3qd.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
AdFind
Advanced IP Scanner
SharpShares
SoftPerfect NetScan
|
AnyDesk
Atera
LogMeIn
MobaXterm
Syncro
|
Eraser
GMER
NSudo
PowerTool
|
Mimikatz
NirSoft Dialupass
NirSoft IEPassView (iepv)
NirSoft MailPassView
NirSoft Netpass
NirSoft RouterPassView
|
Brute Ratel C4
Cobalt Strike
|
Chisel
Cloudflared
OpenSSH
|
PsExec
|
RClone
|
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Discovery | Lateral Movement | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|---|
| Phishing: Spearphishing Attachment | Command and Scripting Interpreter: PowerShell | Create or Modify System Process: Windows Service | Domain Accounts | Obfuscated Files or Information: HTML Smuggling | Account Discovery: Local Account | Remote Services: SMB/Windows Admin Shares | Exfiltration Over Web Service: Exfiltration to Cloud Storage | Application Layer Protocol | Data Encrypted for Impact |
| Command and Scripting Interpreter: Windows Command Shell | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Abuse Elevation Control Mechanism: Bypass User Account Control | Process Injection | Account Discovery: Domain Account | Valid Accounts: Domain Accounts | Application Layer Protocol: Web Protocols | |||
| Domain Accounts | Network Share Discovery | Use Alternate Authentication Material: Pass the Hash | |||||||
| Domain Trust Discovery |