User Avatar

Firewall Bypass: Automatic Outbound Open ...

User Avatar

Firewall Bypass using Reverse Shells

User Avatar

Firewall Bypass using HTTP/HTTPS Tunneling

User Avatar

Port Forwarding

User Avatar

Pivoting

User Avatar

Impersonate

User Avatar

Log Management with Wevtutil

User Avatar

Credential Dumping: NTDS.dit (Metasploit)

User Avatar

Windows: Inject Payload Into Executable

User Avatar

Windows: OpenOffice Malicious Macro

User Avatar

Windows: NTLM Hash Cracking

User Avatar

Windows: Hidden Bind Shell

User Avatar

Privilege Escalation: Impersonate

User Avatar

Windows Manage Hosts File Injection

User Avatar

Privilege Escalation: SeAssignPrimaryToken

User Avatar

Credential Dumping: NTDS.dit

User Avatar

Windows: WMI: Post Exploitation