Injecting Java In-memory Payloads For Post-exploitation |
|
|
|
Lateral movement and on-prem NT hash dumping with Microsoft Entra Temporary Access Passes |
|
|
|
From ChatBot To SpyBot: ChatGPT Post Exploitation |
|
|
|
Entra ID Connect Arbitrary Password Overwrite |
|
|
|
Technical Advisory – Multiple Vulnerabilities in Nagios XI |
|
|
|
Unauthenticated Access to GCP Dataproc Can Lead to Data Leak |
|
|
|
Okta For Red Teamers |
|
|
|
Hijacking Someone Else’s DCSync |
|
|
|
My secret to API privesc: Tapping compromised web servers |
|
|
|
From Self-Hosted GitHub Runner to Self-Hosted Backdoor |
|
|
|