- From Misconfigured Certificate Template to Windows Domain Admin https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/from-misconfigured-certificate-template-to-domain-admin 2 comments netsec
- Taking Back the Windows Search Bar, Help, and more. Looking for feedback! https://www.ired.team/offensive-security/privilege-escalation/t1183-image-file-execution-options-injection 3 comments privacy
- Tutorial: Return-to-libc https://www.ired.team/offensive-security/code-injection-process-injection/binary-exploitation/return-to-libc 2 comments netsec
- Writing a Custom Bootloader https://www.ired.team/miscellaneous-reversing-forensics/windows-kernel-internals/writing-a-custom-bootloader 4 comments reverseengineering
- Dumping LSASS without Mimikatz with MiniDumpWriteDump == Reducing Chances of Getting Flagged https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsass-passwords-without-mimikatz-minidumpwritedump-av-signature-bypass 4 comments reverseengineering
- Dumping LSASS without Mimikatz with MiniDumpWriteDump == Reducing Chances of Getting Flagged https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsass-passwords-without-mimikatz-minidumpwritedump-av-signature-bypass 25 comments netsec
- ShadowMove: Lateral Movement by Duplicating Existing Connected Sockets https://www.ired.team/offensive-security/lateral-movement/shadowmove-lateral-movement-by-stealing-duplicating-existing-connected-sockets 20 comments netsec
- Windows API Hashing in Malware https://www.ired.team/offensive-security/defense-evasion/windows-api-hashing-in-malware 5 comments reverseengineering