All Posts All Linux Windows Enable AVX/AVX2 Support in Kali VM on VirtualBox June 21, 2025 Linux Enable AVX/AVX2 Support in Kali VM on VirtualBox timewrap: A Handy faketime Alias Using NTP June 12, 2025 Linux A shell function to run commands with time spoofing using faketime and NTP servers Active Directory Certificate Services (AD CS) Exploitation – ESC Paths Cheatsheet June 11, 2025 Windows A concise, attacker-focused reference of Enterprise Security Control (ESC) abuse paths in Active Directory Certificat... Web Shell via Polyglot ZIP + PDF Upload Bypass June 10, 2025 Linux Bypassing file upload filters using ZIP/PDF polyglots or directory tricks. SeManageVolumePrivilege Exploit June 10, 2025 Windows SeManageVolumePrivilege Exploit – AD CS Certificate Theft to DA via Certipy Certipy Shadow Credentials (KeyCredentialLink Abuse) June 10, 2025 Windows Covert lateral movement by injecting shadow credentials into a target user's object. Linux Privilege Escalation via Sudo Misconfiguration June 06, 2025 Linux Sudo misconfigurations on Linux systems provide a common vector for privilege escalation. Attackers exploit overly pe... CEH v13 Engage June 06, 2025 Linux CEH v13 Engage solutions