technology
offense • tradecraft • tooling
- An Intro to Powershell Empire
- Badrats C2: Initial Access Payloads
- Bypassing Next-Gen Firewalls
- Capturing Authentication from Out of the Office
- Comparing Methods of Windows Credential Theft
- Comparing Windows Execution Methods
- Delegation: the Good, the Bad, and the Ugly
- Command Line Boot Camp for Cybersecurity
- Microsoft SQL, Beacon, and YOU
- NTLM, Network Poisoning, and Forced Authentication
- Operator’s Guide to the Meterpreter BOFLoader
- Peeling Back the Layers on Powershell Empire
- Powershell Empire: Socks and Pivoting
- Practical Guide to NTLM Relaying in 2021
- Reflecting on Reflection: Microsoft’s Greatest Feature
- Silver and Golden Tickets for Pentesters
- Operating Inside the Interpreted: Offensive Python