|
You are here |
0xboku.com | ||
| | | | |
taeluralexis.com
|
|
| | | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | | |
aadinternals.com
|
|
| | | | | The toolkit for Azure AD hackers, bounty hunters, red/blue teamers | |
| | | | |
4bes.nl
|
|
| | | | | Manage your policies as Code. This post shows how to Backup and restore Conditional access policies with PowerShell. | |
| | | | |
blog.xpnsec.com
|
|
| | | In this post we will be exploring another "roasting" method which involves exploiting a weak account configuration setting in Active Directory.. AS-REP Roasting. | ||