Often times attackers have the need to generate a wordlist based on certain criteria which are required for pentest scenarios like password spraying/brute-forcing. Other times
Many tools now create an HTTP request and let users modify its contents. Similarly, fuzzing works by sending the same type of request multiple times
Exe2hex is a tool that g0tmilk developed, and you can find it here. The tool transcribes EXE into a series of hexadecimal strings, which DEBUG.exe
Often while conducting penetration tests, attackers aim to escalate their privileges. Be it Kerberoasting or a simple lsass dump attack, stealing NTLM hashes always tops
In this article, we are going to discuss and demonstrate in our lab setup, the exploitation of the new vulnerability identified as CVE-2021-44228 affecting the
Today, we’ll explore how to acquire a reverse shell using Powershell scripts on the Windows platform. Table of Content Powercat Invoke-PowerShellTcp (Nishang) ConPtyShell Mini-reverse PowerShell
In this post, you will learn how to use MsfVenom to generate all types of payloads for exploiting the windows platform. Read beginner guide from
Powercat is a simple network utility designed to perform low-level network communication operations. It implements the well-known Netcat functionality in Powershell. Interestingly, traditional anti-virus solutions
This is in continuation with the Metasploit for Pentester Creds series of articles that we are presenting. More specifically, we learned about the Workspaces and