Offensive Security Researcher · Active Directory · Post-Exploitation
🌴
On vacation
Red Team / Offensive Security. Web Security / Windows Active Directory / Post Exploitation
-
nt authority\system
- Earth
-
10:19
(UTC +08:00) - https://whoamianony.top/
- @wh0amitz
Pinned Loading
-
-
PetitPotato
PetitPotato PublicLocal privilege escalation via PetitPotam (Abusing impersonate privileges).
-
BypassCredGuard
BypassCredGuard PublicCredential Guard Bypass Via Patching Wdigest Memory
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.
