Tunneling C2 messages in ICMP traffic.
Using AD CS certificates to achieve persistence in an Active Directory environment.
Extracting NTLM hashes without the need for Mimikatz.
A review of the Evasion Techniques and Breaching Defences course by Offensive Security.
Performing NTLM relay attacks using SMB and LDAP.
A list of one line commands for Windows to download and execute payloads.
How to intercept NTLM-SSP hashed credentials for offline cracking.
A walkthrough for VulnHub’s Casino Royale CTF.
A writeup of the VulnHub GoldenEye capture the flag (CTF) challenge.