InPosts By SpecterOps Team MembersbyLance B. CainSPA is for Single-Page Abuse! - Using Single-Page Application Tokens to Enumerate AzureAuthor: Lance B. Cain1d ago
InInfoSec Write-upsbyPhyo WaThone WinFull Lab Notes of Pass-the-Hash for Active Directory PentestingAs a basic Active Directory (AD) pentester, I know you may find it challenging to differentiate between Pass-the-Hash (PtH) and…Aug 22
Viral Vaghela15 Creative and Advanced XSS Exploits That Will Change How You Think About Web VulnerabilitiesIn this blog, we’ll explore 15 creative and advanced XSS exploits that push the boundaries of what you think is possible with this…Nov 16Nov 16
Vijay GuptaRed Team Warfare: Simulating Real-World Threats for Resilient CybersecurityIn the cybersecurity landscape, Red Teaming has emerged as a formidable strategy. It’s not just about vulnerability assessment — it’s…Nov 9Nov 9
InPosts By SpecterOps Team MembersbyLance B. CainSPA is for Single-Page Abuse! - Using Single-Page Application Tokens to Enumerate AzureAuthor: Lance B. Cain1d ago
InInfoSec Write-upsbyPhyo WaThone WinFull Lab Notes of Pass-the-Hash for Active Directory PentestingAs a basic Active Directory (AD) pentester, I know you may find it challenging to differentiate between Pass-the-Hash (PtH) and…Aug 22
Viral Vaghela15 Creative and Advanced XSS Exploits That Will Change How You Think About Web VulnerabilitiesIn this blog, we’ll explore 15 creative and advanced XSS exploits that push the boundaries of what you think is possible with this…Nov 16
Vijay GuptaRed Team Warfare: Simulating Real-World Threats for Resilient CybersecurityIn the cybersecurity landscape, Red Teaming has emerged as a formidable strategy. It’s not just about vulnerability assessment — it’s…Nov 9
Shebin53Abusing Active Directory ACLs for Privilege Escalation: A Red Team GuideMisconfigured Access Control Lists (ACLs) in AD can be leveraged by attackers to gain privileges. This blog will walk through how to…Nov 1
Vijay GuptaMastering Red TeamingIn today’s cybersecurity landscape, organizations face sophisticated threats that demand a proactive, offensive approach to defense. Red…Nov 5
assume-breachHome Grown Red Team: Getting System On Windows 11 With Havoc C2Havoc C2 has quickly become one of my favorite open source C2s. It’s features offer everything that you need to complete a pentest or red…Oct 27, 20223