User Avatar

Firewall Bypass: Automatic Outbound Open ...

User Avatar

Firewall Bypass using Reverse Shells

User Avatar

Firewall Bypass using HTTP/HTTPS Tunneling

User Avatar

Port Forwarding

User Avatar

Pivoting

User Avatar

Impersonate

User Avatar

Log Management with Wevtutil

User Avatar

Credential Dumping: NTDS.dit (Metasploit)

User Avatar

Windows: Inject Payload Into Executable

User Avatar

Windows: OpenOffice Malicious Macro

User Avatar

Windows: NTLM Hash Cracking

User Avatar

Windows: Hidden Bind Shell

User Avatar

Privilege Escalation: Impersonate

User Avatar

Windows Manage Hosts File Injection

User Avatar

Privilege Escalation: SeImpersonatePrivilege

User Avatar

Credential Dumping: NTDS.dit

User Avatar

Windows: WMI: Post Exploitation

User Avatar

Metasploit Windows: DLL Injection

User Avatar

Windows: Metasploit Loader

User Avatar

Windows: Browser History

User Avatar

Windows: OpenSSH

User Avatar

Windows: OpenSSH Persistence

User Avatar

Disable Windows Defender Signatures

User Avatar

Windows: SCShell

User Avatar

Windows: BitLocker Unlocking

User Avatar

Windows: JScript Meterpreter Dropper

User Avatar

Windows: File Smuggling with HTML and ...

User Avatar

Windows: PowerShell Shellcode Execution

User Avatar

Dumping RDCMan Credentials

User Avatar

Dumping RDP Credentials

User Avatar

Windows: Web Delivery Exploits

User Avatar

Windows: MSBuild Shellcode Execution

User Avatar

Windows: HTA Server

User Avatar

Windows Priv-Esc: SeRestorePrivilege

FREE LAB
User Avatar

Extracting Local Hashes: SeBackupPrivilege