Blog
-
Published 2024-01-31
A slightly on the spectrum look at IPv4 addresing and classes
-
Published 2023-11-08
Guide to setting up an Active Directory Domain Controller in VirtualBox using Kali
-
Published 2023-09-26
How to get around PHP disabled_functions utilizing Local File Injection (LFI) and a bit on named pipes and reverse shells.
-
Published 2023-07-18
Exploring remote process DLL Injection, DLL writing, and deploying a gob encoded tcp bind shell.
-
Published 2023-07-11
EDR evasion using rc4 encrypted shellcode by writing a file to disk, downloading rc4 encrypted payloads from a server and injecting them into memory.
-
Published 2023-07-08
Standard Nmap and Metasploit with mimikatz thrown into the mix for fun. Vulnerability and exploit research, privilege escalation, RDP sessions, and a few tricks to spy on the target.
-
Published 2023-07-02
Exploit development from Proofs Of Concept and CVEs. Explore a Ruby exploit, rewrite it in Python. Payload development, authentication development. Just a really good room for coding and how to code with an attackers mindset.
-
Published 2023-06-29
Example syntax and command line argument definitions for the amazing nmap scanner.
-
Published 2023-06-29
Vulnerability scanning using nmap, exploitation using metasploit. Examples of creating a reverse TCP shell, upgrading the shell, process migration, hash cracking, and search to find flags.