Loading...
This site is best viewed in a modern browser with JavaScript enabled.
Something went wrong while trying to load the full version of this site. Try hard-refreshing this page to fix the error.
Microsoft
About Windows Penetration Testing, internals, architecture, etc.
ASP.NET Core Kestrel Vulnerability
Privilege Access Management (PAM)
How to Safely Remove a Dual Boot Setup from Windows
A basic overview of Hypervisor Implants
Pentesting Active Directory - Part 3 | Recon with AD Module, Bloodhound, PowerView & Adalanche
Pentesting Active Directory - Part 7 | Abusing Misconfigured Templates (ESC1)
Windows Remoting: Difference between psexec, wmiexec, atexec, *exec
Pentesting Active Directory - Part 6 | domain persistence and cross forest attacks
Pentesting Active Directory - Part 5 | Lateral Movement, Privilege Escalation & Tools
Pentesting Active Directory - Part 4 | LLMNR Poisoning
Pentesting Active Directory - Part 2 | Access Control, Users, KRGBT, Golden ticket attack
CVE-2021-40444 - RCE in Microsoft's MSHTML browser rendering engine | MerkSpy
Pentesting Active Directory - Part 1 | Trees, Forest and Trust Relations
USA Bans Kaspersky Lab - A Critical Move to Safeguard Cybersecurity
Reverse engineering LSASS to decrypt DPAPI keys
Gaining persistence on Windows with Time Providers
Dumping data from the Microsoft Recall folder
NTLM Deprecated by Microsoft 2024, So let's pentest Kerberos
LDAP Pass-back attack; A old printers story.
Privileges Escalation Techniques (Basic to Advanced) for Windows - (Part-4)
Next Page »