Explore >> Select a destination


You are here

0xboku.com
| | taeluralexis.com
4.1 parsecs away

Travel
| | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies.
| | aadinternals.com
2.4 parsecs away

Travel
| | The toolkit for Azure AD hackers, bounty hunters, red/blue teamers
| | 4bes.nl
4.4 parsecs away

Travel
| | Manage your policies as Code. This post shows how to Backup and restore Conditional access policies with PowerShell.
| | blog.xpnsec.com
44.6 parsecs away

Travel
| In this post we will be exploring another "roasting" method which involves exploiting a weak account configuration setting in Active Directory.. AS-REP Roasting.