2023 Installing Kali in AWS EC2 Instance Brace Yourself: Cyber Attacks on Australian Businesses Set to Skyrocket The Power of In-Memory Executions: How to Execute Code without Touching Disk Understanding DevSecOps Security Test Pyramid
2020 Nette Framework: CVE-2020-15227 Phirautee- Writing Ransomware using Living off the Land (LotL) Tactics Restore Lost Capacity Of Your USB Drives and SD Cards HiveJack IMSI Catcher
2019 Living Off The Land Binaries - AT Command Web Application Pentest - HTML-to-PDF-Converter Internal Infrastructure Pentest - Socks Tunnel Internal Infrastructure Pentest - metasploit gpp Internal Infrastructure Pentest - msfvenom Internal Infrastructure Pentest - User Management Kali Internal Infrastructure Pentest - Unencrypted HDD Boot Internal Infrastructure Pentest - UAC Bypass Internal Infrastructure Pentest - Responder Internal Infrastructure Pentest - Procdump Internal Infrastructure Pentest - Nmap Ping Sweep Internal Infrastructure Pentest - Nessus Installation Internal Infrastructure Pentest - Kerberoasting Internal Infrastructure Pentest - Repos For Internal Pentest Internal Infrastructure Pentest - Hydra Internal Infrastructure Pentest - Citrix Breakout Internal Infrastructure Pentest - Netcat Internal Infrastructure Pentest - Enable RDP and Remote Assistance on A Remote Machine Internal Infrastructure Pentest - Extracting Juicy Information from Registry Internal Infrastructure Pentest - Skeleton Key Attack Internal Infrastructure Pentest - Mimikatz Internal Infrastructure Pentest - Password Spraying With CMD Internal Infrastructure Pentest - Hashcat Password Cracking Internal Infrastructure Pentest - LLMNR Internal Infrastructure Pentest - DumpSec Internal Infrastructure Pentest - Extracting NTDS.DIT File Internal Infrastructure Pentest - Extracting NTDS.DIT File Internal Infrastructure Pentest - Remote PsExec Internal Infrastructure Pentest - Null Session Internal Infrastructure Pentest - List of Commands Internal Infrastructure Pentest - Disable Security Policies and Services Hardware Hacking - Dropbox for Pentesting Hardware Hacking - Information Gathering ATM/Kiosk Machine Hacking - Shortcuts to Breakout of the Screen ATM/Kiosk Machine Hacking - Folder Path Alternatives ATM/Kiosk Machine Hacking - Captive Portal Breakout ATM/Kiosk Machine Hacking - Shell Protocols