
6 min read
Pentesting Running rockyou.txt is easy enough - but nowadays hardly succesful, at least not as goto-solution.
Running rockyou.txt is easy enough - but nowadays hardly succesful, at least not as goto-solution.
This blog post will cover how to execute a payload on opening a powerpoint presentation.
In our evasion series we take a look at the latest in evasion evolution: Freeze
KrbRelayUp is a no-fix method for privilege escalation - that's why it's still very interesting and usable.
Got your new Schmalaxy SXT9000 Smartphone with the great features and security, but it's already boring? Let's bring tools like Metasploit or SQLMap into your Pocket
We already explored many simple pathes to be able to run exe files while bypassing EDR like Defender. Now we go a step further.