A blog post discussing the often overlooked dangers of CSV injection in applications.
This blog post provides a practical guide on NTLM relaying, aiming to clear up confusion and offer an up-to-date approach to utilizing hashes obtained with Responder for Active Directory attacks. It addresses the differences between NTLM, NTLMv1/v2, and Net-NTLMv1/v2, ensuring clarity for readers.
A blog post discussing the often overlooked dangers of CSV injection in applications.
A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection
A simple SSRF-testing sheriff written in Go
High-performant, coroutines-driven, and fully customisable Low & Slow load generator for real-world pentesting with undetectability through Tor.
Tool for exploiting Sixnet RTUs to gain root level access with little effort.
A free, safe, and legal training ground for ethical hackers to test and expand their skills