Extracting NTLM hashes without the need for Mimikatz.
A review of the Evasion Techniques and Breaching Defences course by Offensive Security.
Using relative JMP instructions to escape small buffers.
Blocking outbound docker traffic using an IPTables firewall.
Performing NTLM relay attacks using SMB and LDAP.
Bypassing NX on 64-bit Linux.
Bypassing DEP & ASLR using pointer leakage and return orientated programming.