Recently Updated Pages
[Backup] OSEP and OSWE Review
Hello folks, recently I took OSWE exam. For more information about the course, you can check the ...
[Backup] Kerberos Delegation
Hey friends, it is the 3rd article in my Active Directory Theory and Exploitation series. Today, ...
[Backup] Kerberos
Hey friends, it is the second article in my Active Directory Theory and Exploitation series. Toda...
[Backup] Domain Enumeration Methodology
Hey folks, today I start a new series of articles to discuss Active Directory Exploitation. This ...
[Backup] Walkthrough of My Vulnerable AD Set
Hi guys, in previous days I designed and built a difficult and complex vulnerable AD set, I plann...
[Backup] How did I design and build a complex AD set
Hi Folks, today I would like to share how did I design and build a vulnerable AD set. Before movi...
[Backup] How Did I Take Over CobaltStrike Servers
Hi folks, today I would like to share how I take over some Cobalt Strike TeamServerswith Quake an...
Use Searching Engines to Hunt For Threat Actors
Background Hi folks, today, I’d like to discuss how to leverage search engines to identify vulne...
Bypass AMSI On Windows 11
Motivation In this article, I want to break down AMSI (Anti-Malware Scan Interface) and its bypa...
Targeted and Efficien Phishing: Alteryx Workflow
Background Recently, my friend who works in the accounting industry has been working hard to lea...