Swissky
8442b304c9
SMBExec + Refresh & Access Token Azure
2023-02-15 17:03:49 +01:00
Swissky
ae46ac0338
WMIExec + SharpSCCM
2023-02-15 12:33:20 +01:00
Swissky
36e135776f
AD Groups + PowerShell Defenses
2023-02-14 15:13:41 +01:00
Swissky
9a511046ae
GPO update timing
2023-02-11 20:29:32 +01:00
Swissky
c08949fdc2
Github Pages Trigger
2023-02-11 20:22:28 +01:00
Swissky
14cc88371d
WSL + RDP Passwords + MSPaint Escape
2023-02-11 17:49:55 +01:00
CravateRouge
a8bef1873a
Add PrintNightmare exploit using WebDAV
2023-01-23 17:06:05 +01:00
Swissky
1a9bfdd86f
Merge pull request #614 from Darktortue/patch-zerologon
...
Added zerologon authentication relay technique
2023-01-10 21:11:43 +01:00
Darktortue
8caba394d5
Added zerologon authentication relay technique
2023-01-10 11:23:45 +01:00
Swissky
b27ba26af9
Merge pull request #609 from m3dsec/patch-1
...
Update bloodyAD.py when enabling DONT_REQ_PREAUTH for ASREPRoast attack.
2023-01-10 11:06:07 +01:00
Swissky
d4742a9688
SOCKS Compatibility Table + CORS
2023-01-05 01:50:11 +01:00
m3dsec
834c6bca20
Update bloodyAD.py when enabling DONT_REQ_PREAUTH for ASREPRoast attack.
2023-01-01 14:24:57 +01:00
Swissky
5190829ab4
RustHound Examples
2022-12-30 11:01:31 +01:00
Swissky
d67ec2469c
SCCM Shares
2022-12-04 11:38:19 +01:00
Swissky
cbb2137f3b
ESC11 - Relay NTLM to ICPR
2022-11-21 10:48:27 +01:00
Swissky
5966c3a21b
NTDS Reversible Encryption
2022-11-11 14:52:56 +01:00
Swissky
e5ea12a3ca
Active Directory Federation Services
2022-11-07 10:10:33 +01:00
Swissky
3e9ef2efbe
ADFS Golden SAML
2022-11-07 10:10:21 +01:00
CravateRouge
c14392731c
Fix broken link not compatible with MkDocs
2022-11-06 12:12:36 +01:00
CravateRouge
598751f7c6
Redirect duplicate
2022-11-04 14:43:20 +01:00
Fabian S. Varon Valencia
9128b183d3
update link URL
2022-10-24 12:28:31 -05:00
Swissky
fe41254fde
XXS Public Example + PHP Filter RCE
2022-10-24 12:05:39 +02:00
Swissky
8df30de938
Remove deadlink
2022-10-21 12:16:32 +02:00
Swissky
8df0f565f3
Sapphire and Diamond Tickets
2022-10-16 20:46:05 +02:00
Swissky
6479c3a400
Merge pull request #574 from sebch-/patch-5
...
Update Active Directory Attack.md
2022-10-12 21:43:44 +02:00
Seb
b809e104e6
Update Active Directory Attack.md
2022-10-12 21:24:47 +02:00
Seb
f18d4991ff
Update Active Directory Attack.md
2022-10-12 19:47:40 +02:00
Alexander Lübeck
576322d475
Fixed invalid hyperlink
2022-10-02 15:58:16 +02:00
Swissky
4ed3e3b6b9
Blind SSTI Jinja
2022-10-02 12:24:39 +02:00
CravateRouge
dad7362da6
Update bloodyAD attacks
2022-09-06 19:13:34 +02:00
Swissky
191a72c57e
Merge branch 'master' of https://github.com/swisskyrepo/PayloadsAllTheThings
2022-09-06 10:05:16 +02:00
Swissky
2be739ea4f
Fixing TGS/ST
2022-09-06 10:03:49 +02:00
Swissky
bdc2d55dd9
Merge pull request #533 from 0xsyr0/patch-1
...
Quick fix for WSUS malicious patch
2022-09-04 20:54:17 +02:00
Swissky
9e2471a472
SCCM Network Account
2022-09-04 20:51:23 +02:00
Swissky
811863501b
ESC9 - No Security Extension
2022-09-03 12:07:24 +02:00
0xsry0
343d63f79f
Quick fix for WSUS malicious patch
...
Not sure if it is deprecated but by tackling the box Outdated on HTB, the command didn't worked with two `&&`. To concatenate `"net user WSUSDemo Password123! /add ` and `net localgroup administrators WSUSDemo /add\""`, the `^&` is required.
2022-08-24 09:10:55 +02:00
Swissky
6650c361e7
Capture a network trace with builtin tools
2022-08-15 15:02:29 +02:00
Swissky
7fe0a0475e
Docker Escape cgroup
2022-08-05 12:26:31 +02:00
Swissky
835d6fffe0
Shadow Credentials
2022-08-05 12:00:41 +02:00
Seb
310338b279
Update Active Directory Attack.md
...
Find AD
2022-08-02 15:09:23 +02:00
Swissky
e386a110d9
Find DC
2022-07-27 17:23:30 +02:00
Swissky
fc8fadbb0c
PR Guidelines + User Hunting + HopLa Configuration
2022-06-30 16:33:35 +02:00
Swissky
ad336b4d55
Privileged Access Management (PAM) Trust
2022-06-09 11:30:43 +02:00
Swissky
881c354b34
Pre-Created Computer Account
2022-06-08 12:14:11 +02:00
Swissky
0c7da8ec41
DNS Admins Group
2022-06-07 20:36:09 +02:00
Swissky
3066615cde
LAPS Access + Pass the Cert + Writeable folder
2022-05-31 11:57:44 +02:00
Swissky
5035ed0891
WSUS Exploitation
2022-05-15 21:22:39 +02:00
Swissky
4cf464cc96
Certifried CVE-2022-26923
2022-05-13 09:44:51 +02:00
Swissky
67457ec582
SCCM deployment + JSON uploads
2022-05-09 15:14:26 +02:00
Swissky
d40e055629
Golden GMSA + Scheduled Task
2022-03-15 11:15:44 +01:00