Resources

Open Source Tools, Community Labs and Presentations

Open Source Tools and Community Labs

Red Labs (BETA)

FREE labs to sharpen your skills

Nishang

Using PowerShell for Penetration Testing

RACE

Execute ACL attacks and backdoors

Deploy-Deception

Deploy active directory decoy objects

Kautilya

Pwnage with Human Interface Devices

365-Stealer

Check user awareness for Illicit Consent Grant attacks

Presentations and Videos

BruCON 2022

0wn-premises: Bypassing Microsoft Defender for Identity

DEF CON 2019

RACE - Minimal Rights and ACE for Active Directory Dominance

BruCON 2018

Forging Trusts for Deception in Active Directory

IT Defense 2018

Hacked? Pray that the Attacker used PowerShell

44CON 2017

Red Team Revenge - AttackingMicrosoft ATA

BlackHat USA 2017 and BruCON 2017

Evading Microsoft ATA for Active Directory Domination

x33fcon 2017

PowerShell forPractical PurpleTeaming

BlackHat USA 2016

AMSI: How Windows 10 Plans to Stop Script-Based Attacks

BlackHat Europe and DeepSec 2015

Continuous Intrusion: Why CI tools are an Attacker's Best Friends

HITB, Amsterdam 2015

Workshop:PowerShellfor PenetrationTesters

DeepSec 2014

Lethal ClientSide Attacks using PowerShell

DEF CON 21

Powerpreter:Post Exploitationlike a Boss

BlackHat Europe 2013

PowerShellfor PenetrationTesters

EuSec West'12

Owning Windows 8 with Human Interface Devices

RSA China'12

Hacking thefuture withUSB HID

0
    0
    Your Cart
    Your cart is emptyReturn to Shop
    Scroll to Top