Introduction
Introduction Statistics Contact Development Disclaimer Help
Posts by [email protected]
Post #Ax7r3x52rt2MCKVbTU by [email protected]
0 likes, 1 repeats
Zero Click, One NTLM: Microsoft Security Patch Bypass (CVE-2025-50154) https://…
Post #Ax7syLlMO0BUv6l2Tg by [email protected]
0 likes, 1 repeats
GitHub Copilot: Remote Code Execution via Prompt Injection (CVE-2025-53773) htt…
Post #Ax7tRkGYMZjjJTMg3U by [email protected]
0 likes, 1 repeats
HKLM\SYSTEM\Setup\sMarTdEpLoY – The (Static) Keys to Abusing PDQ SmartDeploy…
Post #AxAQzCysJBPujLa0zg by [email protected]
0 likes, 1 repeats
Juicing ntds.dit Files to the Last Drop https://specterops.io/blog/2025/08/14/j…
Post #AxC9MccbjUKw3W6D3Y by [email protected]
0 likes, 1 repeats
Recursive Request Exploits (RRE) trace API chains backward from a protected res…
Post #AxDwkoq3i26ArBU79M by [email protected]
0 likes, 1 repeats
SCCM Control via MSSQL https://bokkisec.com/blog/SCCM_MSSQL
Post #AxE91NTTttiMMSaQDI by [email protected]
0 likes, 1 repeats
Collect infrastructure and permissions data from vCenter and export it as a Blo…
Post #AxITdptrRHPDF0NfoO by [email protected]
0 likes, 1 repeats
Generate an Alphabetical Polymorphic Shellcode https://github.com/Maldev-Academ…
Post #AxUYT5V3vfxK6czjjk by [email protected]
0 likes, 1 repeats
Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Mana…
Post #AxUixeeanAvjMWfNzc by [email protected]
0 likes, 1 repeats
Metasploit can now exploit certificate templates vulnerable to ESC9, ESC10, and…
Post #AxYYUwkSDSuIArv74a by [email protected]
0 likes, 1 repeats
BloodHound 8.0 T-Shirt Fundraiser, Supporting Hope for HIE https://www.customin…
Post #AxZXrtqvF6tN3eHpku by [email protected]
0 likes, 1 repeats
Finding and Exploiting CVE-2025-50674 in OpenMediaVault https://xbz0n.sh/blog/C…
Post #AxhRCvTZG1NVl87ZNw by [email protected]
0 likes, 1 repeats
Keepass Stealer Using WinAPI Hooking https://www.pwntricks.com/KeePass-Stealer-…
Post #Ay3zbj4cB5k4S6Z60W by [email protected]
0 likes, 1 repeats
Detecting Password-Spraying with a Honeypot Account https://trustedsec.com/blog…
Post #AyERtR4eZuVU8cPom0 by [email protected]
0 likes, 1 repeats
Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking https://gith…
Post #AyGRRjTewyMFQGp0fg by [email protected]
0 likes, 1 repeats
Interract with MSSQL servers and their linked instances in restricted environme…
Post #AyIMp6HOEAypLdKGFk by [email protected]
0 likes, 1 repeats
Leveraging Raw Disk Reads to Bypass EDR https://medium.com/workday-engineering/…
Post #AyIPpmkecLSOw223k0 by [email protected]
0 likes, 1 repeats
Windows Local Privilege Escalation through the bitpixie Vulnerability https://b…
Post #AyL1TvouPAp7GRws4G by [email protected]
0 likes, 1 repeats
More Fun With WMI https://specterops.io/blog/2025/09/18/more-fun-with-wmi/
Post #AyOdBgfYNOj8nKBDV2 by [email protected]
0 likes, 1 repeats
Jelusick - Apolitical Ecstasy https://open.spotify.com/album/6h4ixsrzJj8y5niwwp…
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.