Skip to main content

Recently Updated Pages

Pivoting

This page will present a serie of commands to pivot through domains during Pentest and Red Team o...

How to Hide Your CobaltStrike

CobaltStrike Overview Cobalt Strike is the most prevalent threat emulation software packages use...

NorthSec 2021 Badge Writeup

To learn more about the badge itself and the development behind the scenes I would recommend wa...

WMI

The goal of this cheatsheet is to provide some "ready to use" commands for enumeration, attacks a...

Active Directory

The goal of this cheatsheet is to present some "ready to use" commands for offensive security in ...

NahamCon CTF 2020 Writeup

NahamCon CTF 2020 Writeup URL: https://ctf.nahamcon.com/challenges I got board on the weekend a...

Direct system call injection process to avoid anti-kill

The content is as titled. This is also a technology I have used for a long time. I have also pos...

HideAndSec

Nous sommes un groupe de passionnés d'informatique, de sécurité web, logiciel, IoT, analyse de bi...

Members

mxrch Passionate about computing and security since always, I'm also interested in AI, blockchai...

Members

mxrch Passionné d'informatique et de sécurité depuis toujours, je m'intéresse aussi du côté de l...

HackTM CTF 2020 Writeup

Since the CTF is still active I wont be dropping the flags. You can follow along and complete the...

The RC4 encryption

The RC4 encryption algorithm is a symmetric encryption algorithm. Symmetric encryption algorithm...

Windows thread control

Multithreading undoubtedly brings a lot of convenience and improves a lot of development efficien...

Decentralized Identifiers (DIDs)

Rappels Identity and Access Management (IAM) Il existe actuellement 3 grandes formes de Gestion ...

Defenses Evasion (The Quick'n Dirty)

This is just a quick and dirty overview of some defense evasion tactics that are out there for so...

Domain Control Elevation

0x01 Preface Just a collection of personal notes covering the following: Password in GPP and SY...

Cache Poisoning

Qu'est-ce que c'est ? Le cache poisoning a été popularisé en 2018, bien que cette attaque exista...

Content Discovery / Recon

Obtain subdomains and links from the target host: for h in $(cat hosts.txt); do curl -siL https:...

Introduction to Cobalt Strike

0x01 What is Cobalt Strike "Cobalt Strike is software for Adversary Simulations and Red Team O...

Cobalt Strike Process Injection

0x01 Intro Here are my thoughts on process injection and share some technical details about Coba...