|
You are here |
0xboku.com | ||
| | | | |
taeluralexis.com
|
|
| | | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | | |
aadinternals.com
|
|
| | | | | The toolkit for Azure AD hackers, bounty hunters, red/blue teamers | |
| | | | |
o365blog.com
|
|
| | | | | The toolkit for Azure AD hackers, bounty hunters, red/blue teamers | |
| | | | |
blog.ropnop.com
|
|
| | | Write up of my journey figuring out how to host the CLR and execute .NET assemblies from memory in pure Go. | ||