Skip to main content

Recently Updated Pages

[Backup] OSEP and OSWE Review

Notes

Hello folks, recently I took OSWE exam. For more information about the course, you can check the ...

Updated 8 months ago by winslow

[Backup] Kerberos Delegation

Notes

Hey friends, it is the 3rd article in my Active Directory Theory and Exploitation series. Today, ...

Updated 8 months ago by winslow

[Backup] Kerberos

Notes

Hey friends, it is the second article in my Active Directory Theory and Exploitation series. Toda...

Updated 8 months ago by winslow

[Backup] Domain Enumeration Methodology

Notes

Hey folks, today I start a new series of articles to discuss Active Directory Exploitation. This ...

Updated 8 months ago by winslow

[Backup] Walkthrough of My Vulnerable AD Set

Notes

Hi guys, in previous days I designed and built a difficult and complex vulnerable AD set, I plann...

Updated 8 months ago by winslow

[Backup] How did I design and build a complex AD set

Notes

Hi Folks, today I would like to share how did I design and build a vulnerable AD set. Before movi...

Updated 8 months ago by winslow

[Backup] How Did I Take Over CobaltStrike Servers

Threat Intelligence

Hi folks, today I would like to share how I take over some Cobalt Strike TeamServerswith Quake an...

Updated 8 months ago by winslow

Use Searching Engines to Hunt For Threat Actors

Threat Intelligence

Background Hi folks, today, I’d like to discuss how to leverage search engines to identify vulne...

Updated 8 months ago by winslow

Bypass AMSI On Windows 11

Red Team

Motivation In this article, I want to break down AMSI (Anti-Malware Scan Interface) and its bypa...

Updated 8 months ago by winslow

Targeted and Efficien Phishing: Alteryx Workflow

Red Team

Background Recently, my friend who works in the accounting industry has been working hard to lea...

Updated 8 months ago by winslow