Page Not Found
Sorry, The page you were looking for could not be found.
If you expected this page to exist, you might not have permission to view it.
Popular Pages
Active Directory
This cheatsheet is built from numerous papers, GitHub repos and GitBook, blogs, HTB boxes and lab...
Active Directory - Python edition
This cheatsheet is built from numerous papers, GitHub repos and GitBook, blogs, HTB boxes and lab...
NorthSec 2021 Badge Writeup
To learn more about the badge itself and the development behind the scenes I would recommend wa...
Active Directory Certificate Services
It is a cheatsheet about the different AD-CS attacks presented by SpecterOps. All the references ...
In the Potato family, I want them all
Back in 2016, an exploit called Hot Potato was revealed and opened a Pandora's box of local privi...
Members
mxrch Passionate about computing and security since always, I'm also interested in AI, blockchai...
Cache Poisoning
What is it ? Cache poisoning was popularized in 2018, although this attack existed long before, a...
Domain Control Elevation
0x01 Preface Just a collection of personal notes covering the following: Password in GPP and SY...
Introduction to Cobalt Strike
0x01 What is Cobalt Strike "Cobalt Strike is software for Adversary Simulations and Red Team O...
Brève introduction
Tout d'abord qu'est ce qu'un buffer overflow? Et à quoi ça sert? Les buffer overflow sont des fa...
Popular Books
Cheatsheets
Articles with ready to use commands for pentest and CTF
Red Teaming
Red teaming methodologies, tools, and techniques
Windows
Windows intrusion testing methodologies, tools, and techniques
About Us
Who are we and who sits behind the mask?
Pwn
Let's pwn the wrld
Linux
Linux intrusion testing methodologies, tools, and techniques
CTF
Do you want some writeups kidz ?
Web
The World Wide Web
Research
Searching 0days for the mama