Explore >> Select a destination


You are here

aadinternals.com
| | blog.xpnsec.com
3.1 parsecs away

Travel
| | Originally presented at SOCON-2024, and continuing the series into post-exploitation techniques against Identity Providers, in this blog post we'll look at Ping, OneLogin and Entra ID. I'll discuss how post-exploitation techniques effective against Okta apply to other providers, release new tools for post-exploitation, and look at what proves to be effective when critical assets lie beyond an Identity Provider portal.
| | zer1t0.gitlab.io
5.1 parsecs away

Travel
| |
| | o365blog.com
0.3 parsecs away

Travel
| | The toolkit for Azure AD hackers, bounty hunters, red/blue teamers
| | gist.github.com
17.7 parsecs away

Travel
| Speed-up secp256k1 by using endomorphism https://paulmillr.com/posts/noble-secp256k1-fast-ecc/ - explanation-simple.md