A Years Worth of Active Directory Privilege Escalation
The end of the year is a good time to sit back and reflect for a moment on the past year. So let us take a look at the ten most common ways how I got
The end of the year is a good time to sit back and reflect for a moment on the past year. So let us take a look at the ten most common ways how I got
The end of the year is a good time to sit back and reflect for a moment on the past year. So let us take a look at the ten most common ways how I got
HI HI!! Finally, I made my mind to write on the journey when I became eJPT (eLearnSecurity Junior Penetration Tester) which came to an end on 8th
Payloads All The Things A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques
This post is intended to help CPTC participants or general penetration testers write better pentest reports, similar to a post I had done earlier
We were recently asked to assess the security of a well known BYOD solution that uses Android Enterprise management to create a separate working
By Nathan Jones Director, Customer Success, Synack In Formula One, the most prepared teams have the best chances of success. Yet, preparation alone
By Nathan Jones Director, Customer Success, Synack In Formula One, the most prepared teams have the best chances of success. Yet, preparation alone
The CPTC core team recently met and held a live stream where they announced the wildcard winners and answered several questions from the audience.
Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of various security tools for pentest
A web application that makes it easy to run your pentest and bug bounty projects. Description The app provides a convenient web interface for
PwnDoc is a pentest reporting application making it simple and easy to write your findings and generate a customizable Docx report. The main
Over the years, we’ve advocated self-paced learning, where students learn about cybersecurity through video courses and hands-on labs. But we
This script was to developed to capture screenshot during pentest engagment and OSCP. IMPORTANT: The screenshot feature is no longer allowed
How many organisations know what their supply chain cyber risk is? Is it the big partners, supplier and customers or the smallest partners, customers