Introduction Recently I was involved in an engagement where I was attacking smart card based Active Directory networks. The fact is though, you don’t need a physical smart card at all to authenticate to Active Directory that enforces smart card logon. The attributes of the certificate determine if it can be used for smart card […]
A 2 part series on creating a basic EDR detection system and then a bypass implementation. In part 2 I introduce SharpBlock, a method of bypassing EDR’s.
A 2 part series on creating a basic EDR detection system and then a bypass implementation. In part one we cover how to create a basic EDR.
Upgraded JuicyPotato performing Local Service to SYSTEM privilege escalation on Windows 7 to the latest Windows 10 / Server 2019.
C# PoC for Lenovo CVE-2020-8319 and CVE-2020-8324
A Chrome cookie decryptor and dumping tool
How to convert a Go program to a reflective DLL for Cobalt Strike