Carlos PadillaAlfred — THM WriteUpExploit Jenkins to gain an initial shell, then escalate your privileges by exploiting Windows authentication tokens.7 min read·Jun 17, 2024--1--1
Carlos PadillaThe perils of Python: How to program a KeyLogger (easy)Discover the Hidden Dangers of Python: Learn how to program a Keylogger and know its Impact on Digital Security.8 min read·Jun 14, 2024----
Carlos PadillaBiblioteca — THM WriteUpShhh. Be very very quiet, no shouting inside the biblioteca.4 min read·Jun 12, 2024----
Carlos PadillaSkynet — THM WriteUpA vulnerable Terminator themed Linux machine.4 min read·Jun 10, 2024----
Carlos PadillaCyberLens — THM WriteUpCan you exploit the CyberLens web server and discover the hidden flags?6 min read·May 22, 2024----
Carlos PadillaCat Pictures 2 — THM WriteUpCat Pictures 2 — THM WriteUp: Now with more Cat Pictures!5 min read·Mar 13, 2024----
Carlos PadillaThis is how I create a Simple PHP Web Shell (GPWShell-Proyect)I always use the Pentest Monkey revserse shell when uploading php files when playing ctfs. So, for a change, I came up with the idea of…3 min read·Mar 12, 2024----