timewrap: A Handy faketime Alias Using NTP
timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...
timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...
Technique 1: Null Byte Bypass (\x00) Create a fake .pdf that contains a valid header, and append a .php shell: ❯ cat shell.php <?php if(isset($_GET['c...
Abusing the SeManageVolumePrivilege allows low-privileged users to perform raw volume access — often used for LSASS dumping. However, a more stealthy and dev...
Shadow Credentials are a stealthy method of impersonating users in Active Directory environments by injecting a forged certificate identity into the target a...
Sudo misconfigurations on Linux systems provide a common vector for privilege escalation. Attackers exploit overly permissive sudo rules to gain root-level a...
CEH v13 Engage CEH Engage Part 1 Challenge 1: An attacker conducted footprinting on a web application and saved the resulting report Dumpster.xlsx in the doc...
Enabling AVX/AVX2 in Kali Linux VM on VirtualBox (from Windows Host)
timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...
Technique 1: Null Byte Bypass (\x00) Create a fake .pdf that contains a valid header, and append a .php shell: ❯ cat shell.php <?php if(isset($_GET['c...
Sudo misconfigurations on Linux systems provide a common vector for privilege escalation. Attackers exploit overly permissive sudo rules to gain root-level a...
CEH v13 Engage CEH Engage Part 1 Challenge 1: An attacker conducted footprinting on a web application and saved the resulting report Dumpster.xlsx in the doc...
Building Windows Executables with GitHub Actions
Abusing the SeManageVolumePrivilege allows low-privileged users to perform raw volume access — often used for LSASS dumping. However, a more stealthy and dev...
Shadow Credentials are a stealthy method of impersonating users in Active Directory environments by injecting a forged certificate identity into the target a...
Sudo misconfigurations on Linux systems provide a common vector for privilege escalation. Attackers exploit overly permissive sudo rules to gain root-level a...
CEH v13 Engage CEH Engage Part 1 Challenge 1: An attacker conducted footprinting on a web application and saved the resulting report Dumpster.xlsx in the doc...
Sudo misconfigurations on Linux systems provide a common vector for privilege escalation. Attackers exploit overly permissive sudo rules to gain root-level a...
CEH v13 Engage CEH Engage Part 1 Challenge 1: An attacker conducted footprinting on a web application and saved the resulting report Dumpster.xlsx in the doc...
Sudo misconfigurations on Linux systems provide a common vector for privilege escalation. Attackers exploit overly permissive sudo rules to gain root-level a...
CEH v13 Engage CEH Engage Part 1 Challenge 1: An attacker conducted footprinting on a web application and saved the resulting report Dumpster.xlsx in the doc...
Technique 1: Null Byte Bypass (\x00) Create a fake .pdf that contains a valid header, and append a .php shell: ❯ cat shell.php <?php if(isset($_GET['c...
Shadow Credentials are a stealthy method of impersonating users in Active Directory environments by injecting a forged certificate identity into the target a...
Abusing the SeManageVolumePrivilege allows low-privileged users to perform raw volume access — often used for LSASS dumping. However, a more stealthy and dev...
Shadow Credentials are a stealthy method of impersonating users in Active Directory environments by injecting a forged certificate identity into the target a...
Abusing the SeManageVolumePrivilege allows low-privileged users to perform raw volume access — often used for LSASS dumping. However, a more stealthy and dev...
Shadow Credentials are a stealthy method of impersonating users in Active Directory environments by injecting a forged certificate identity into the target a...
Abusing the SeManageVolumePrivilege allows low-privileged users to perform raw volume access — often used for LSASS dumping. However, a more stealthy and dev...
Technique 1: Null Byte Bypass (\x00) Create a fake .pdf that contains a valid header, and append a .php shell: ❯ cat shell.php <?php if(isset($_GET['c...
Technique 1: Null Byte Bypass (\x00) Create a fake .pdf that contains a valid header, and append a .php shell: ❯ cat shell.php <?php if(isset($_GET['c...
timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...
timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...
timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...
timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...
timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...
Enabling AVX/AVX2 in Kali Linux VM on VirtualBox (from Windows Host)
Enabling AVX/AVX2 in Kali Linux VM on VirtualBox (from Windows Host)
Enabling AVX/AVX2 in Kali Linux VM on VirtualBox (from Windows Host)
Enabling AVX/AVX2 in Kali Linux VM on VirtualBox (from Windows Host)
Building Windows Executables with GitHub Actions
Building Windows Executables with GitHub Actions
Building Windows Executables with GitHub Actions
Building Windows Executables with GitHub Actions
Building Windows Executables with GitHub Actions