Pentesting SCCM.
Identifying users logged into a remote host.
Compromising open X Window System servers.
Encoding command line arguments to evade detection.
Maintaining access to an Active Directory environment.
A Mimikatz command reference.
Generating forged Kerberos gold, silver and diamond tickets.
A PowerView command reference.
Setting up Obfuscator LLVM with Visual Studio 2022.
Converting shellcode to look like a series of IP addresses.
Replacing existing ROR13 function hash names in shellcode to evade signature based detection.
Executing Shellcode from the address space of known good DLL’s.