Library of hacking learning resources, not sponsored
NAME | TAGS | AUTHORS | DATE | TIME TO READ | DIFFICULTY | PRICE | Actions | |
---|---|---|---|---|---|---|---|---|
"Relaying" Kerberos - Having fun with unconstrained delegation | Kerberos Unconstrained Delegation Kerberos Delegation | Dirk-jan Mollema | 2019-02-18 | 27 | medium | Free | ||
(Ab)using the Microsoft Identity Platform: Exploring Azure AD Token Caching | Token | Ruben Boonen | 2023-12-15 | 28 | medium | Free | ||
(Anti-)Anti-Rootkit Techniques - Part I: UnKovering mapped rootkits | Rootkit | eversinc33 | 2024-03-23 | 14 | hard | Free | ||
.NET Assembly Obfuscation for Memory Scanner Evasion | Dotnet Obfuscation | eversinc33 | 2023-10 | 0 | medium | Free | ||
11. Demystifying Thread Call Stack Spoofing by Alessandro Magnosi | Stack Spoofing | klezVirus | 2023-08-21 | 39 | medium | Free | ||
A "deep dive" in Cert Publishers Group | Groups ADCS | Decoder | 2023-11-20 | 0 | medium | Free | ||
A Case Study in Wagging the Dog: Computer Takeover | Kerberos Delegation RBCD | Harmj0y | 2019-02-28 | 0 | medium | Free | ||
A Developer's Introduction to Beacon Object Files | BOF | Christopher Paschen | 2020-06-16 | 0 | hard | Free |