A Volume Shadow Copy client that excels in dumping creds and getting away with it
SAMDump and exfiltrate
SAMDump and exfiltrate
Sometimes you can’t have BURP, or you need something really light. Here’s a full featured SNI capable HTTPS intercepting proxy that will generate a Certifica...
redteam-pentesting.de excellent article on reflection Windows Coercion Methods Reflective Kerberos Relay Attack Reflective Kerberos Relay Attack (PDF)...
Walkthrough of a pwnable using pwntools, pwndbg, AFL
Almost 15 years later i’ll resume blogging, many many thanks for stopping by!