Introduction to C2 Frameworks

Introduction to C2 Frameworks

Introduction to C2 Frameworks July 27, 2023 Android Shashikant Prasad Command and Control (C2) frameworks have emerged as a sophisticated and consequential dimension in the

Read More »
Exploiting MS SQL Servers

Exploiting MS SQL Servers

Exploiting MS SQL Servers July 18, 2023 Active Directory Shaunak Khosla As companies continue to rely on databases to store sensitive information, securing the data

Read More »
BloodHound Cheat Sheet

BloodHound Cheat Sheet

BloodHound Cheat Sheet July 17, 2023 Active Directory Kunal Kumar BloodHound is a powerful security tool that uses graph theory to reveal the relationships between

Read More »
AS-REP Roasting Blog

AS-REP Roasting

AS-REP ROASTING July 15, 2023 Active Directory Karan Patel ‍Kerberos is a network authentication protocol used to provide secure authentication over a non-secure network. While

Read More »