windows 51
- VL Puppet
- Tool Review: WinSSH
- VL Intercept
- VL Shinra Part 3 - Initial Payload Design, Host Enumeration & getting SYSTEM
- VL Shinra Part 2 - Enumerate, Enumerate, Enumerate!
- Ekoparty 2022 BFS Windows Challenge
- Windows Kernel Exploitation - Arbitrary Memory Mapping (x64)
- SQLi, LFI to RCE and Unintended Privesc via XAMLX & Impersonation – StreamIO @ HackTheBox
- Resource-Based Constrained Delegation - Resourced @ PG-Practice
- Active Directory, JEA & Random Stuff – Acute @ HackTheBox
- Windows Kernel Exploitation - HEVD x64 Use-After-Free
- Windows Kernel Exploitation - HEVD x64 Type Confusion
- Windows Kernel Exploitation - HEVD x64 Stack Overflow
- Windows Kernel Exploitation - VM Setup
- Bypassing DEP with VirtualProtect (x86)
- Bypassing DEP with WriteProcessMemory (x86)
- ASP, Windows Containers, Responder & NoPAC - Anubis @ HackTheBox
- Lab - Baby Walkthrough
- Lab - Rainbow Walkthrough
- Stealing Hashes with Responder, GPO Permissions & Unintended Ways - Vault @ PG Practice
- Password Spraying, gMSA, ADIDNS & Constrained Delegation - Intelligence @ HackTheBox
- LDAP, WebDAV, LAPS & Unintended Solutions - Hutch @ PG Practice
- Active Directory, Reverse Engineering & Unintended Solutions - Pivotapi @ HackTheBox
- SSRF into Responder, gMSA Password & SeRestorePrivilege - Heist @ PG Practice
- On Disabled Windows Privileges
- SEH Based Buffer Overflow & DLL Hijacking - UT99 @ PG Practice
- FTP to Web Shell & SeImpersonate – AuthBy @ PG Practice
- LFI to RCE, Sticky Notes & SQLi - Breadcrumbs @ HackTheBox
- Electron-Updater RCE - Atom @ HackTheBox
- XSS, Deserialization & SeImpersonate - Cereal @ HackTheBox
- .NET Remoting & WCF - Sharp @ HackTheBox
- APT @ HackTheBox
- Reel2 @ HackTheBox
- Sauna @ HackTheBox
- Monteverde @ HackTheBox
- Nest @ HackTheBox
- P.O.O. Endgame @ HackTheBox
- Control @ HackTheBox
- Sniper @ HackTheBox
- Forest @ HackTheBox
- Bankrobber @ HackTheBox
- RE @ HackTheBox
- Heist @ HackTheBox
- Hackback @ HackTheBox
- Bastion @ HackTheBox
- Helpline @ HackThebox
- Arkham @ HackTheBox
- Ethereal @ HackTheBox
- Abusing Diaghub
- Access @ HackTheBox
- Giddy @ HackTheBox