Very Lazy Tech 👾File Transfer Cheatsheet: Windows and LinuxFile transfer is a critical component in post-exploitation, penetration testing, and red teaming. Different environments require specific…Oct 30
Karim WalidActive Directory Pentesting 101 - Part 1Hi everyone, In this series we will discuss Active Directory Penetration Testing methods and how it works . Active Directory is ..…Jan 301
InAardvark InfinitybyAardvark InfinityWaspDescription: A stealthy Python tool for credential harvesting and keylogging. Wasp captures keystrokes and monitors clipboard content…Sep 28Sep 28
Roberto T.Different ways to transfer files from/to Linux (and Windows) machines (II)We will continue with the last post about “ Different ways to transfer files from/to Linux (and Windows) machines (I)”. Please, if you have…Sep 28, 20231Sep 28, 20231
InAardvark InfinitybyAardvark InfinityLeopardDescription: A stealthy and efficient Python tool for lateral movement and post-exploitation on compromised networks. Leopard automates the…Sep 28Sep 28
Very Lazy Tech 👾File Transfer Cheatsheet: Windows and LinuxFile transfer is a critical component in post-exploitation, penetration testing, and red teaming. Different environments require specific…Oct 30
Karim WalidActive Directory Pentesting 101 - Part 1Hi everyone, In this series we will discuss Active Directory Penetration Testing methods and how it works . Active Directory is ..…Jan 301
InAardvark InfinitybyAardvark InfinityWaspDescription: A stealthy Python tool for credential harvesting and keylogging. Wasp captures keystrokes and monitors clipboard content…Sep 28
Roberto T.Different ways to transfer files from/to Linux (and Windows) machines (II)We will continue with the last post about “ Different ways to transfer files from/to Linux (and Windows) machines (I)”. Please, if you have…Sep 28, 20231
InAardvark InfinitybyAardvark InfinityLeopardDescription: A stealthy and efficient Python tool for lateral movement and post-exploitation on compromised networks. Leopard automates the…Sep 28
KryptologystPost-exploitation frameworks.Summary In this article, we will talk about frameworks that help exploit vulnerabilities, establish persistence, and advance within the…Jun 19
Abel MateoCredential Safari: Credential HarvestingAn attacker gains access to the shell. They look around through folders and files for something specific — something that will grant…Feb 2
Roberto T.Different ways to transfer files from/to Linux (and Windows) machines (I)After a short break, here we go again! In this blog post series, we will talk about some different ways to transfer data to/from Linux (and…Sep 19, 2023