Chirag SavlaJul 24, 202115 minFantastic Windows Logon types and Where to Find Credentials in ThemHello All, In this blog post we will explore and learn about various Windows Logon Types and understand how are these logon type events...
Chirag SavlaJul 6, 20216 minAbusing Resource-Based Constrained Delegation (RBCD) using LinuxHello All, In this post we will discuss on how to perform Resource-Based Constrained Delegation (RBCD) attack from an Linux machine as an...
webmaster03668May 19, 20219 minIntroduction To 365-Stealer - Understanding and Executing the Illicit Consent Grant Attack365-Stealer is phishing tool written in python3 which abuses App registrations to perform illicit consent grant attack.