Thanks for ur support!
Recent posts
3 - AD Persistence
Constrained Deleg and Malicious SSP
2 - AD Privesc
LAPS, gMSA and Constrained Deleg
1 - Lateral Movement
Almost the same content as CRTP + Extracting Credentials from LSASS
CRTE Review
Get to know the Certified Read Team Expert certification by Altered Security
7 - AD Defense
We Hac, We Attac but most importantly We Protec!
6 - AD Privesc
Kerberos attacks, Delegations, Across Trusts escalation, ADCS and More
5 - AD Persistence
Golden, Silver, Diamond Tickets, Custom SSP, ACLs abuses and More
4 - Offensive .NET
Use Minimal obfuscation and String manipulation to bypass Win Defender
3 - Lateral Movement
PowerShell Remoting, Mimikatz, Over Pass the hash and More
2 - Win Privesc
Unquoted Paths and Modifiable Services
1 - AD Enumeration
Learn how to enumerate the Domain, ACLs, GPOs, Trusts and More
CRTP Review
Certified Red Team Professional
4 - Windows Lateral Movement
Intro to Windows Lateral Movement
3 - Windows Privesc
Intro to Windows Privesc
2 - Bloodhound
BloodHound is a versatile and powerful tool for AD enumeration and analysis.