Carlos PadillaAlfred — THM WriteUpExploit Jenkins to gain an initial shell, then escalate your privileges by exploiting Windows authentication tokens.Jun 171Jun 171
Carlos PadillaThe perils of Python: How to program a KeyLogger (easy)Discover the Hidden Dangers of Python: Learn how to program a Keylogger and know its Impact on Digital Security.Jun 14Jun 14
Carlos PadillaBiblioteca — THM WriteUpShhh. Be very very quiet, no shouting inside the biblioteca.Jun 12Jun 12
Carlos PadillaCyberLens — THM WriteUpCan you exploit the CyberLens web server and discover the hidden flags?May 22May 22
Carlos PadillaCat Pictures 2 — THM WriteUpCat Pictures 2 — THM WriteUp: Now with more Cat Pictures!Mar 13Mar 13
Carlos PadillaThis is how I create a Simple PHP Web Shell (GPWShell-Proyect)I always use the Pentest Monkey revserse shell when uploading php files when playing ctfs. So, for a change, I came up with the idea of…Mar 12Mar 12