Resources
Open Source Tools, Community Labs and Presentations
Open Source Tools and Community Labs
Red Labs (BETA)
FREE labs to sharpen your skills
Nishang
Using PowerShell for Penetration Testing
RACE
Execute ACL attacks and backdoors
Deploy-Deception
Deploy active directory decoy objects
Kautilya
Pwnage with Human Interface Devices
365-Stealer
Check user awareness for Illicit Consent Grant attacks
Presentations and Videos
BruCON 2022
0wn-premises: Bypassing Microsoft Defender for Identity
DEF CON 2019
RACE - Minimal Rights and ACE for Active Directory Dominance
BruCON 2018
Forging Trusts for Deception in Active Directory
IT Defense 2018
Hacked? Pray that the Attacker used PowerShell
44CON 2017
Red Team Revenge - AttackingMicrosoft ATA
BlackHat USA 2017 and BruCON 2017
Evading Microsoft ATA for Active Directory Domination
x33fcon 2017
PowerShell forPractical PurpleTeaming
BlackHat USA 2016
AMSI: How Windows 10 Plans to Stop Script-Based Attacks
BlackHat Europe and DeepSec 2015
Continuous Intrusion: Why CI tools are an Attacker's Best Friends
HITB, Amsterdam 2015
Workshop:PowerShellfor PenetrationTesters
DeepSec 2014
Lethal ClientSide Attacks using PowerShell
DEF CON 21
Powerpreter:Post Exploitationlike a Boss
BlackHat Europe 2013
PowerShellfor PenetrationTesters
EuSec West'12
Owning Windows 8 with Human Interface Devices
RSA China'12
Hacking thefuture withUSB HID