Categories
Red Team
- Research
- Utilizing Programmatic Identifiers (ProgIDs) for UAC Bypasses
- Abusing LNK "Features" for Initial Access and Persistence
- Development
PWN
CTF
- Hack The Box
- Devoops writeup
- Celestial writeup
- Silo writeup
- Valentine writeup
- Aragog writeup
- Jeeves writeup
- Sense writeup
- Mantis writeup
- Nineveh writeup
- Blocky writeup
- Europa writeup
- Vulnhub
- Brainpan1 writeup
- SkyTower writeup
- Kioptrix 3 writeup
- Bulldog writeup
- Zico2 writeup
- Kioptrix 2 writeup
- Pentestit Lab v11