Posts by [email protected] | |
Post #Ax7r3x52rt2MCKVbTU by [email protected] | |
0 likes, 1 repeats | |
Zero Click, One NTLM: Microsoft Security Patch Bypass (CVE-2025-50154) https://… | |
Post #Ax7syLlMO0BUv6l2Tg by [email protected] | |
0 likes, 1 repeats | |
GitHub Copilot: Remote Code Execution via Prompt Injection (CVE-2025-53773) htt… | |
Post #Ax7tRkGYMZjjJTMg3U by [email protected] | |
0 likes, 1 repeats | |
HKLM\SYSTEM\Setup\sMarTdEpLoY – The (Static) Keys to Abusing PDQ SmartDeploy… | |
Post #AxAQzCysJBPujLa0zg by [email protected] | |
0 likes, 1 repeats | |
Juicing ntds.dit Files to the Last Drop https://specterops.io/blog/2025/08/14/j… | |
Post #AxC9MccbjUKw3W6D3Y by [email protected] | |
0 likes, 1 repeats | |
Recursive Request Exploits (RRE) trace API chains backward from a protected res… | |
Post #AxDwkoq3i26ArBU79M by [email protected] | |
0 likes, 1 repeats | |
SCCM Control via MSSQL https://bokkisec.com/blog/SCCM_MSSQL | |
Post #AxE91NTTttiMMSaQDI by [email protected] | |
0 likes, 1 repeats | |
Collect infrastructure and permissions data from vCenter and export it as a Blo… | |
Post #AxITdptrRHPDF0NfoO by [email protected] | |
0 likes, 1 repeats | |
Generate an Alphabetical Polymorphic Shellcode https://github.com/Maldev-Academ… | |
Post #AxUYT5V3vfxK6czjjk by [email protected] | |
0 likes, 1 repeats | |
Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Mana… | |
Post #AxUixeeanAvjMWfNzc by [email protected] | |
0 likes, 1 repeats | |
Metasploit can now exploit certificate templates vulnerable to ESC9, ESC10, and… | |
Post #AxYYUwkSDSuIArv74a by [email protected] | |
0 likes, 1 repeats | |
BloodHound 8.0 T-Shirt Fundraiser, Supporting Hope for HIE https://www.customin… | |
Post #AxZXrtqvF6tN3eHpku by [email protected] | |
0 likes, 1 repeats | |
Finding and Exploiting CVE-2025-50674 in OpenMediaVault https://xbz0n.sh/blog/C… | |
Post #AxhRCvTZG1NVl87ZNw by [email protected] | |
0 likes, 1 repeats | |
Keepass Stealer Using WinAPI Hooking https://www.pwntricks.com/KeePass-Stealer-… | |
Post #Ay3zbj4cB5k4S6Z60W by [email protected] | |
0 likes, 1 repeats | |
Detecting Password-Spraying with a Honeypot Account https://trustedsec.com/blog… | |
Post #AyERtR4eZuVU8cPom0 by [email protected] | |
0 likes, 1 repeats | |
Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking https://gith… | |
Post #AyGRRjTewyMFQGp0fg by [email protected] | |
0 likes, 1 repeats | |
Interract with MSSQL servers and their linked instances in restricted environme… | |
Post #AyIMp6HOEAypLdKGFk by [email protected] | |
0 likes, 1 repeats | |
Leveraging Raw Disk Reads to Bypass EDR https://medium.com/workday-engineering/… | |
Post #AyIPpmkecLSOw223k0 by [email protected] | |
0 likes, 1 repeats | |
Windows Local Privilege Escalation through the bitpixie Vulnerability https://b… | |
Post #AyL1TvouPAp7GRws4G by [email protected] | |
0 likes, 1 repeats | |
More Fun With WMI https://specterops.io/blog/2025/09/18/more-fun-with-wmi/ | |
Post #AyOdBgfYNOj8nKBDV2 by [email protected] | |
0 likes, 1 repeats | |
Jelusick - Apolitical Ecstasy https://open.spotify.com/album/6h4ixsrzJj8y5niwwp… |