The Hacker Library

Library of hacking learning resources, not sponsored

NAMETAGSAUTHORSDATETIME TO READDIFFICULTYPRICEActions
"Relaying" Kerberos - Having fun with unconstrained delegation

Kerberos

Unconstrained Delegation

Kerberos Delegation

Dirk-jan Mollema

2019-02-1827
medium
Free
(Ab)using the Microsoft Identity Platform: Exploring Azure AD Token Caching

Token

Ruben Boonen

2023-12-1528
medium
Free
(Anti-)Anti-Rootkit Techniques - Part I: UnKovering mapped rootkits

Rootkit

eversinc33

2024-03-2314
hard
Free
.NET Assembly Obfuscation for Memory Scanner Evasion

Dotnet

Obfuscation

eversinc33

2023-100
medium
Free
11. Demystifying Thread Call Stack Spoofing by Alessandro Magnosi

Stack Spoofing

klezVirus

2023-08-2139
medium
Free
A "deep dive" in Cert Publishers Group

Groups

ADCS

Decoder

2023-11-200
medium
Free
A Case Study in Wagging the Dog: Computer Takeover

Kerberos Delegation

RBCD

Harmj0y

2019-02-280
medium
Free
A Developer's Introduction to Beacon Object Files

BOF

Christopher Paschen

2020-06-160
hard
Free