Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Japanese Mexican Food Topic -https://www.instagram.com/reel/C6l045yu6lZ/?igsh=MTAwZ2Rsem90dnp3eA==
- https://bohops.com/2017/12/02/trust-direction-an-enabler-for-active-directory-enumeration-and-trust-exploitation/
- https://posts.specterops.io/on-detection-tactical-to-functional-f37c9b0b8874
- https://learn.microsoft.com/en-us/windows/win32/adschema/a-sidhistory
- https://blog.trailofbits.com/2023/11/22/etw-internals-for-security-research-and-forensics/
- https://unit42.paloaltonetworks.com/what-i-learned-from-reverse-engineering-windows-containers/
- https://www.mdsec.co.uk/2024/02/active-directory-enumeration-for-red-teams/
- https://ctovswild.com/2009/09/03/bitmask-searches-in-ldap/
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-crtd/ec71fd43-61c2-407b-83c9-b52272dec8a1
- https://www.ultimatewindowssecurity.com/blog/default.aspx
- https://github.com/daem0nc0re/Abusing_Weak_ACL_on_Certificate_Templates
- https://blog.trailofbits.com/2023/11/22/etw-internals-for-security-research-and-forensics/
- https://blog.tofile.dev/2022/11/30/kdu_sealighter.html
- https://cyberstoph.org/posts/2022/03/detecting-shadow-credentials/
- https://github.com/FalconForceTeam/BOF2shellcode
- https://github.com/anthemtotheego/InlineExecute-Assembly
- https://blog.netwrix.com/2021/08/25/running-laps-in-the-race-to-security/
- https://devblogs.microsoft.com/oldnewthing/20050214-00/?p=36463
- https://github.com/xuanxuan0/DripLoader/blob/master/DripLoader/DripLoader.cpp
- https://oldboy21.github.io/posts/2024/02/reflective-dll-got-indirect-syscall-skills/
- https://github.com/fin3ss3g0d/NativeThreadpool
- ---
- https://avred.r00ted.ch/
- https://github.com/netero1010/EDRSilencer
- https://github.com/TheD1rkMtr/DocPlz
- https://www.safebreach.com/blog/defender-pretender-when-windows-defender-updates-become-a-security-risk/
- https://i.blackhat.com/us-18/Thu-August-9/us-18-Bulazel-Windows-Offender-Reverse-Engineering-Windows-Defenders-Antivirus-Emulator.pdf
- https://www.french365connection.co.uk/post/mde-keeping-your-antivirus-up-to-date-deep-dive
- https://adamsvoboda.net/extracting-asr-rules/
- https://medium.com/tenable-techblog/stealthy-persistence-privesc-in-entra-id-by-using-the-federated-auth-secondary-token-signing-cert-876b21261106
- https://www.tenable.com/security/research/tra-2020-08
- https://medium.com/tenable-techblog/bypass-windows-10-user-group-policy-and-more-with-this-one-weird-trick-552d4bc5cc1b
- https://posts.specterops.io/not-a-security-boundary-breaking-forest-trusts-cd125829518d
- https://www.youtube.com/watch?v=cN_CzC9KfZw - Not a Security Boundary Bypassing UAC
- https://posts.specterops.io/a-red-teamers-guide-to-gpos-and-ous-f0d03976a31e
- https://t.me/c/1365432225/8312 - xorpd | Assembly Language Adventures
- https://t.me/c/1365432225/8309 - Practical Linux for Penetrating & Bug Bounties
- https://t.me/c/1365432225/8227 - Red Team: Getting Access w/ Michael Allen
- https://t.me/c/1365432225/8216 - Modern WebApp Pentesting w/ BB King
- https://t.me/c/1365432225/8214 - Breaching the Cloud w/ Beau Bullock
- https://t.me/c/1365432225/8210 - Applied Purple Teaming w/ Kent Ickler and Jordan Drysdale
- https://t.me/c/1365432225/8085 - Pentester Academy - Windows System Programming: Security 2022
- https://t.me/c/1365432225/8005 - Udemy | Android App Hacking - Black Belt Edition
- https://t.me/c/1365432225/7868 - Active Directory Protection & Tiering
- https://t.me/c/1365432225/6827 - ZeroToMastery Academy | Rust Programming: The Complete Developer's Guide
- ----
- https://www.harmj0y.net/blog/
- https://www.slideshare.net/AndyRobbins3/here-be-dragons-the-unexplored-land-of-active-directory-acls
- https://www.slideshare.net/DanielLpezJimnez1/understanding-and-hiding-your-operations
- https://www.slideshare.net/harmj0y/derbycon-the-unintended-risks-of-trusting-active-directory
- https://www.slideshare.net/harmj0y/not-a-security-boundary
- https://www.slideshare.net/DanielLpezJimnez1/understanding-and-hiding-your-operations
- https://www.slideshare.net/JasonLang1/red-team-methodology-a-naked-look-169879355
- https://www.slideshare.net/ChandrapalBN/dangling-dns-records-takeover-at-scale
- https://www.slideshare.net/harmj0y/catch-me-if-you-can-powershell-red-vs-blue
- https://www.slideshare.net/PatrickCoble3/derbycon-7-hacking-vdi-recon-and-attack-methods
- https://github.com/matthieu-hackwitharts/Win32_Offensive_Cheatsheet?tab=readme-ov-file#virtualprotect-technique
- https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md
- https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/PrivescPostEx.md
- https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement