Recently Updated Pages

Direct system call injection process to avoid anti-kill

The content is as titled. This is also a technology I have used for a long time. I have also pos...

HideAndSec

Nous sommes un groupe de passionnés d'informatique, de sécurité web, logiciel, IoT, analyse de bi...

Members

mxrch Passionate about computing and security since always, I'm also interested in AI, blockchai...

Members

mxrch Passionné d'informatique et de sécurité depuis toujours, je m'intéresse aussi du côté de l...

Pivoting

This page will present a serie of commands to pivot through domains during Pentest and Red Team o...

HackTM CTF 2020 Writeup

Since the CTF is still active I wont be dropping the flags. You can follow along and complete the...

The RC4 encryption

The RC4 encryption algorithm is a symmetric encryption algorithm. Symmetric encryption algorithm...

Windows thread control

Multithreading undoubtedly brings a lot of convenience and improves a lot of development efficien...

Decentralized Identifiers (DIDs)

Rappels Identity and Access Management (IAM) Il existe actuellement 3 grandes formes de Gestion ...

Defenses Evasion (The Quick'n Dirty)

This is just a quick and dirty overview of some defense evasion tactics that are out there for so...

NahamCon CTF 2020 Writeup

NahamCon CTF 2020 Writeup URL: https://ctf.nahamcon.com/challenges I got board on the weekend a...

Domain Control Elevation

0x01 Preface Just a collection of personal notes covering the following: Password in GPP and SY...

Cache Poisoning

Qu'est-ce que c'est ? Le cache poisoning a été popularisé en 2018, bien que cette attaque exista...

Content Discovery / Recon

Obtain subdomains and links from the target host: for h in $(cat hosts.txt); do curl -siL https:...

Cobalt Strike Process Injection

0x01 Intro Here are my thoughts on process injection and share some technical details about Coba...

Introduction to Cobalt Strike

0x01 What is Cobalt Strike "Cobalt Strike is software for Adversary Simulations and Red Team O...

Cache Poisoning

What is it ? Cache poisoning was popularized in 2018, although this attack existed long before, ...

Reverse shells

Listener Avant tout reverse shell, il faut mettre en place le listener, qui va écouter un port e...

Contact

Pour toutes questions, veuillez nous contacter à : contact[@t]hideandsec[d0t].sh.

CrackMapExec

ENUMERATION Réseau crackmapexec smb 192.168.1.0/24 Shares cme smb 10.0.0.0 -u UserName -p 'PA...