Vulnerability exploitation proof of concepts, walkthroughs, downloadable labs, mitigation, and IOC’s for educational purposes.
- Active Directory Exploitation
- NTLM Relay Attack
- Certificate Misconfiguration Attack
- Disabled Kerberos Pre-Authentication AS-REP
- sAMAccountName Spoofing
- Resource Based Constrained Delegation (coming soon)
- MITM6 Using IPv6 to Take Over the Default DNS Server (coming soon)
- Web & API Exploitation
- Bypassing Security Controls
- RECON and ENUM
- Wireless Exploitation
- Unrelated but Interesting Material
WIP: Much more content to come. Updated 04/17/2023