ParagBagulExploiting Permission Delegation in Active DirectoryHi there! We will explore how Active Directory’s Permission Delegation can be exploited to carry out forced reset password of active…1d ago
Very Lazy TechTop Hacking Books for 2024 (plus Resources): FREE and PaidIn the rapidly evolving world of cybersecurity, keeping up with the latest knowledge is crucial. Whether you’re a seasoned professional or…Sep 171
Vidar FrostbjorninInfoSec Write-upsHow to perform during the OSCP / OSCP+ exam in 2024No, another cheat sheet is NOT the answer!2d ago2d ago
S12 - H4CKService Detection in Malware ResurrectorWelcome to this new Medium post, today i will show you the new version of our Resurrector implementation, in this new version i was adding…1d ago1d ago
ParagBagulExploiting Permission Delegation in Active DirectoryHi there! We will explore how Active Directory’s Permission Delegation can be exploited to carry out forced reset password of active…1d ago
Very Lazy TechTop Hacking Books for 2024 (plus Resources): FREE and PaidIn the rapidly evolving world of cybersecurity, keeping up with the latest knowledge is crucial. Whether you’re a seasoned professional or…Sep 171
Vidar FrostbjorninInfoSec Write-upsHow to perform during the OSCP / OSCP+ exam in 2024No, another cheat sheet is NOT the answer!2d ago
S12 - H4CKService Detection in Malware ResurrectorWelcome to this new Medium post, today i will show you the new version of our Resurrector implementation, in this new version i was adding…1d ago
Aaryan GolatkarOSCP Exposed Part 3: What The OSCP Will Never Teach YouA deep dive into what the OSCP never teaches you despite being the leading certificate in the cyber security industrySep 17
Salman Abu SaqProving Grounds Practice: DetectionIn the begging , let’s Scanning for Open Ports2d ago
Very Lazy TechActive Directory Methodology in Pentesting: A Comprehensive GuideIn today’s digital landscape, Active Directory (AD) serves as the backbone for managing network resources in most enterprise environments…Jun 192