All Posts

Enable AVX/AVX2 Support in Kali VM on VirtualBox
Enable AVX/AVX2 Support in Kali VM on VirtualBox
timewrap: A Handy faketime Alias Using NTP
A shell function to run commands with time spoofing using faketime and NTP servers
Active Directory Certificate Services (AD CS) Exploitation – ESC Paths Cheatsheet
A concise, attacker-focused reference of Enterprise Security Control (ESC) abuse paths in Active Directory Certificat...
Web Shell via Polyglot ZIP + PDF Upload Bypass
Bypassing file upload filters using ZIP/PDF polyglots or directory tricks.
SeManageVolumePrivilege Exploit
SeManageVolumePrivilege Exploit – AD CS Certificate Theft to DA via Certipy
Certipy Shadow Credentials (KeyCredentialLink Abuse)
Covert lateral movement by injecting shadow credentials into a target user's object.
Linux Privilege Escalation via Sudo Misconfiguration
Sudo misconfigurations on Linux systems provide a common vector for privilege escalation. Attackers exploit overly pe...
CEH v13 Engage
CEH v13 Engage solutions