Hands-on reference guides for authorized penetration testing. Full commands, tool coverage, MITRE ATT&CK mapping, and OPSEC notes for each environment. Built for real engagements.
Kerberoasting, AS-REP roasting, BloodHound analysis, DACL abuse, DCSync, Pass-the-Hash, Pass-the-Ticket, ACL attacks, and domain persistence techniques.
Coming SoonSQL injection, XSS, SSRF, XXE, IDOR, authentication bypass, API security testing, JWT attacks, OAuth abuse, and business logic flaws with full payloads.
Coming SoonSUID/GUID, sudo misconfigs, cron jobs, capabilities, NFS, weak file permissions, kernel exploits, container escapes, and service exploitation.
Coming SoonAlwaysInstallElevated, unquoted service paths, DLL hijacking, token impersonation, SeImpersonatePrivilege, registry abuse, and UAC bypass techniques.
Coming Soon