github.com/nccgroup/exploit_mi - Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.

madhuakula/kubernetes-goat

Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.

github.com/madhuakula/kubernet

chompie1337/SIGRed_RCE_PoC

Contribute to chompie1337/SIGRed_RCE_PoC development by creating an account on GitHub.

github.com/chompie1337/SIGRed_

How to Exploit Active Directory ACL Attack Paths Through LDAP Relaying Attacks | Praetorian

Methods by which an attacker can induce a victim user into authenticating using the NT Lan Manager (NTLM) Authentication Protocol.

praetorian.com/blog/how-to-exp

0vercl0k/CVE-2021-31166

Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. - 0vercl0k/CVE-2021-31166

github.com/0vercl0k/CVE-2021-3

How to Silver Ticket Attack Active directory

Silver ticket attack for domain persistence in active directory network silver ticket is a forged service ticket using service account hash.

sheerazali.com/how-to-silver-t

Overcoming Issues Using Custom Python Scripts with Burp Suite Professional | JUMPSEC LABS

The Python Scripter Burp Suite extension can be used to modify requests sent through Burp including those generated by tools such as the active scanner.

labs.jumpsec.com/burp-suite-py

Huh. Knew you could do this with shares but didn't know you could do this for users!

Creating a hidden user in Windows

chaah.awankloud.my/redteaming-

Show older
Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!