Active Directory ACL Abuse with Kali Linux
Active Directory Access Control Lists (ACL), and their associated Access Control Entries (ACE), define the entities and permissions of a specific AD object. If misconfigured, abusing these permissi...
Active Directory Access Control Lists (ACL), and their associated Access Control Entries (ACE), define the entities and permissions of a specific AD object. If misconfigured, abusing these permissi...
After creating a Batocera live USB for retro gaming, I instantly started down the path of game hacking and researching how ROM’s (digital game copies) could be abused… This post serves as my intro...
One of the many rabbit holes Ive gone down recently was the use of WiFi to track client devices. While this technique is not new by any means, I recall seeing matt0177s 2022 Blackhat USA talk where...
Forget compiling payloads and operating on disk — this post demonstrates the use of Python’s portable interpreter for in-memory malware deployment, even when the language isnt installed on the host...
Post Updates 09/2023: Starting in PyInstaller 6, bytecode encryption and the --key argument have been depreciated. Overview In Pythonic Malware Part-1, I demonstrated how Python executables ...
Creating Python executables during an offensive security engagement used to be an effective method of evasion. However, this tactic has become increasingly difficult on modern Windows endpoints. I...