|
You are here |
aadinternals.com | ||
| | | | |
blog.xpnsec.com
|
|
| | | | | Originally presented at SOCON-2024, and continuing the series into post-exploitation techniques against Identity Providers, in this blog post we'll look at Ping, OneLogin and Entra ID. I'll discuss how post-exploitation techniques effective against Okta apply to other providers, release new tools for post-exploitation, and look at what proves to be effective when critical assets lie beyond an Identity Provider portal. | |
| | | | |
zer1t0.gitlab.io
|
|
| | | | | ||
| | | | |
o365blog.com
|
|
| | | | | The toolkit for Azure AD hackers, bounty hunters, red/blue teamers | |
| | | | |
gist.github.com
|
|
| | | Speed-up secp256k1 by using endomorphism https://paulmillr.com/posts/noble-secp256k1-fast-ecc/ - explanation-simple.md | ||