Thanks for ur support!

Recent posts

5 - AD Persistence

Golden, Silver, Diamond Tickets, Custom SSP, ACLs abuses and More

10 minute read

4 - Offensive .NET

Use Minimal obfuscation and String manipulation to bypass Win Defender

3 minute read

3 - Lateral Movement

PowerShell Remoting, Mimikatz, Over Pass the hash and More

3 minute read

2 - Win Privesc

Unquoted Paths and Modifiable Services

1 minute read

1 - AD Enumeration

Learn how to enumerate the Domain, ACLs, GPOs, Trusts and More

9 minute read

CRTP Review

Certified Red Team Professional

less than 1 minute read

4 - Windows Lateral Movement

Intro to Windows Lateral Movement

3 minute read

3 - Windows Privesc

Intro to Windows Privesc

1 minute read

2 - Bloodhound

BloodHound is a versatile and powerful tool for AD enumeration and analysis.

3 minute read

1 - Powershell

Starting with Powershell for AD Exploitation!

4 minute read

15 - Attacking LDAP

First the Fundamentals, then Exploitation!

7 minute read

14 - APIs & Cloud Apps

Attacking APIs & Cloud Based Applications

23 minute read

13 - Authentication & SSO

Attacking JWT, OAuth, SAML and Bypassing 2FA

15 minute read

12 - Attacking Crypto

Padding Oracle, Hash Length Extension, Leveraging MachineKey and More

10 minute read

11 - Server Side Attacks

SSRF, SSI, XSLT attacks and More

27 minute read