This blog is a collections of thoughts, tools, and techniques for offensive and defensive security by a collection of authors.

All opinions and content expressed in this blog are that of the authors and not their respective employers, friends, family, co-workers, significant others, or any other entity. All information the author's provide is for research and educational purposes only and should not be used for any malicious or illegal purpose. Authors are not responsible for abuse of any code, tool, technique, or idea found in this blog.

Popular posts from this blog

No Shells Required - a Walkthrough on Using Impacket and Kerberos to Delegate Your Way to DA

Executing Macros From a DOCX With Remote Template Injection

One Click to Compromise -- Fun With ClickOnce Deployment Manifests