Introduction When it comes to automating builds for any project that I undertake, my goto OS is usually Linux. Generally I find the deployment of build nodes easier to deploy and manage and usually cheaper than their Windows counterparts. The problem with this of course is Windows based software generally needs cross-compiling in someway or […]
Introduction Recently I was involved in an engagement where I was attacking smart card based Active Directory networks. The fact is though, you don’t need a physical smart card at all to authenticate to Active Directory that enforces smart card logon. The attributes of the certificate determine if it can be used for smart card […]
A 2 part series on creating a basic EDR detection system and then a bypass implementation. In part 2 I introduce SharpBlock, a method of bypassing EDR’s.
A 2 part series on creating a basic EDR detection system and then a bypass implementation. In part one we cover how to create a basic EDR.
Upgraded JuicyPotato performing Local Service to SYSTEM privilege escalation on Windows 7 to the latest Windows 10 / Server 2019.
C# PoC for Lenovo CVE-2020-8319 and CVE-2020-8324
A Chrome cookie decryptor and dumping tool
How to convert a Go program to a reflective DLL for Cobalt Strike