776 links
Shared Bookmarks
Home
Login
RSS Feed
ATOM Feed
Tag cloud
Picture wall
Daily
Links per page:
20
50
100
◄Older
page 1 / 2
22 results tagged
internal
x
SySS-Research/Seth: Perform a MitM attack and extract clear text credentials from RDP connections
March 11, 2024 at 11:13:35 AM UTC
- permalink
-
-
https://github.com/SySS-Research/Seth
rdp
mitm
cleartext
downgrade
internal
red
team
GOAD - part 12 - Trusts | Mayfly
December 21, 2022 at 4:47:02 PM UTC
- permalink
-
-
https://mayfly277.github.io/posts/GOADv2-pwning-part12/
internal
pentest
forest
trust
intertrust
inter
eladshamir/Internal-Monologue: Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
November 30, 2022 at 2:57:37 PM UTC
- permalink
-
-
https://github.com/eladshamir/Internal-Monologue
netntlm
ntlm
self
internal
monolog
Active Directory Pentest Lab - Setup | MATRIX.LOCAL - Hebun ilhanlı
September 29, 2022 at 7:10:43 PM UTC
- permalink
-
-
https://www.hebunilhanli.com/wonderland/ad-pentest/ad-pentest-lab-setup/
lab
pentest
ad
internal
No-Fix Local Privilege Escalation Using KrbRelay With Shadow Credentials | Icyguider’s Blog
September 29, 2022 at 3:58:17 PM UTC *
- permalink
-
-
https://icyguider.github.io/2022/05/19/NoFix-LPE-Using-KrbRelay-With-Shadow-Credentials.html
krbrelayup
krbrelay
nimcrypt
no-fix
windows
lpe
ad
internal
lkarlslund/ldapnomnom: Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)
September 21, 2022 at 11:17:06 AM UTC
- permalink
-
-
https://github.com/lkarlslund/ldapnomnom
tool
ldap
ping
username
user
bf
bruteforce
ad
internal
LSASS dumping in 2021/2022 - from memory - without C2 | S3cur3Th1sSh1t
September 8, 2022 at 4:02:20 PM UTC
- permalink
-
-
https://s3cur3th1ssh1t.github.io/Reflective-Dump-Tools/
lsass
dumping
internal
Attacking Active Directory: 0 to 0.9 | zer1t0
comprehensive guide on attacking active directory
May 13, 2022 at 12:03:09 AM UTC
- permalink
-
-
https://zer1t0.gitlab.io/posts/attacking_ad/#s4u-attacks
ad
internal
pentest
It's Raining Shells - Google Slides
March 25, 2022 at 1:28:02 AM UTC
- permalink
-
-
https://docs.google.com/presentation/d/1vVpNezQ1uVS3_PQ_beYH-cQR6qrvGcMP8MWV7LA-nKU/edit#slide=id.g119be77ce24_0_1058
azure
ad
internal
Offensive Operations with PowerSCCM | enigma0x3
December 16, 2021 at 8:02:54 PM UTC
- permalink
-
-
https://enigma0x3.net/2016/02/29/offensive-operations-with-powersccm/
sccm
internal
powersccm
eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation
December 10, 2021 at 11:20:05 AM UTC
- permalink
-
-
https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html
cve-2021-42278
ad
pac
confusion
rubeus
internal
pentest
interne
Targeted Workstation Compromise with SCCM | enigma0x3
November 7, 2021 at 11:50:22 PM UTC *
- permalink
-
-
https://enigma0x3.net/2015/10/27/targeted-workstation-compromise-with-sccm/
sccm
ad
internal
red
team
lateral
SensePost | Building an offensive rpc interface
September 29, 2021 at 8:26:34 PM UTC
- permalink
-
-
https://sensepost.com/blog/2021/building-an-offensive-rpc-interface/
rpc
windows
internal
login-securite/DonPAPI: Dumping DPAPI credz remotely
September 29, 2021 at 12:07:04 PM UTC *
- permalink
-
-
https://github.com/login-securite/DonPAPI
dpapi
donpapi
windows
internal
remote
secrets
How To Use Traefik v2 as a Reverse Proxy for Docker Containers on Ubuntu 20.04 | DigitalOcean
August 17, 2021 at 9:07:47 AM UTC
- permalink
-
-
https://www.digitalocean.com/community/tutorials/how-to-use-traefik-v2-as-a-reverse-proxy-for-docker-containers-on-ubuntu-20-04
traefik
reverse
proxy
docker
containers
compose
network
routing
internal
api
Attacking Active Directory: 0 to 0.9 | zer1t0
May 30, 2021 at 10:47:44 PM UTC
- permalink
-
-
https://zer1t0.gitlab.io/posts/attacking_ad/
active
directory
internal
pentest
cheatsheet
0xbigshaq/php7-internals: Research about the Zend Engine
August 24, 2020 at 3:33:15 PM UTC
- permalink
-
-
https://github.com/0xbigshaq/php7-internals
php
internals
internal
vuln
research
Going Deep | Channel 9
June 17, 2020 at 9:09:37 AM UTC
- permalink
-
-
https://channel9.msdn.com/Shows/Going+Deep
windows
internals
videos
internal
Active-Directory-Exploitation-Cheat-Sheet/A - Recom at master · Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
June 6, 2020 at 12:21:34 PM UTC
- permalink
-
-
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/tree/master/A%20-%20Recom#ad-module-without-rsat
active
directory
ad
enum
recon
cheatsheet
repo
internal
pentests
powerview
rsat
PowerView-3.0 tips and tricks
June 1, 2020 at 1:13:14 PM UTC
- permalink
-
-
https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993
powerview
cheatsheet
harmj0y
ad
internal
redteam
Links per page:
20
50
100
◄Older
page 1 / 2