Thanks for ur support!
Recent posts
5 - AD Persistence
Golden, Silver, Diamond Tickets, Custom SSP, ACLs abuses and More
4 - Offensive .NET
Use Minimal obfuscation and String manipulation to bypass Win Defender
3 - Lateral Movement
PowerShell Remoting, Mimikatz, Over Pass the hash and More
2 - Win Privesc
Unquoted Paths and Modifiable Services
1 - AD Enumeration
Learn how to enumerate the Domain, ACLs, GPOs, Trusts and More
CRTP Review
Certified Red Team Professional
4 - Windows Lateral Movement
Intro to Windows Lateral Movement
3 - Windows Privesc
Intro to Windows Privesc
2 - Bloodhound
BloodHound is a versatile and powerful tool for AD enumeration and analysis.
1 - Powershell
Starting with Powershell for AD Exploitation!
15 - Attacking LDAP
First the Fundamentals, then Exploitation!
14 - APIs & Cloud Apps
Attacking APIs & Cloud Based Applications
13 - Authentication & SSO
Attacking JWT, OAuth, SAML and Bypassing 2FA
12 - Attacking Crypto
Padding Oracle, Hash Length Extension, Leveraging MachineKey and More
11 - Server Side Attacks
SSRF, SSI, XSLT attacks and More