Automatically add headers to all Burp requests to bypass basic WAF rules
Post-exploitation enumeration of windows domain controller with PowerShell
Escalate privileges through insecure registry service permissions
Client-side Exploitation, Phishing attachments, PowerShell