Coerced Authentication

Persuading Windows hosts to provide machine account credentials.

IPv6 Penetration Testing

Testing IPv6 security.

Bypassing Multi Factor Authentication

Intercepting multi factor authentication credentials using an Nginx reverse proxy.


Sending Phishing emails to capture login credentials.


Using Terraform to deploy testing infrastructure & auditing Terraform configuration files.

802.11 Wireless Attacks

Ways of gaining access to WPA-PSK networks.

Cobalt Strike

Getting started with Cobalt Strike.

Kerberos Delegation Attacks

Exploiting constrained, unconstrained and resource based delegation.

Modbus Security

Pentesting the Modbus protocol.

Kubernetes Penetration Testing

Security testing for Kubernetes clusters.

Docker Penetration Testing

Performing security audits of Docker instances.

Linux Privilege Escalation

Privilege escalation techniques for Linux hosts.