top of page

Blog


Fantastic Windows Logon types and Where to Find Credentials in Them
Hello All, In this blog post we will explore and learn about various Windows Logon Types and understand how are these logon type events...
Chirag Savla
Jul 24, 202115 min read


Abusing Resource-Based Constrained Delegation (RBCD) using Linux
Hello All, In this post we will discuss on how to perform Resource-Based Constrained Delegation (RBCD) attack from an Linux machine as an...
Chirag Savla
Jul 6, 20216 min read


Introduction To 365-Stealer - Understanding and Executing the Illicit Consent Grant Attack
365-Stealer is phishing tool written in python3 which abuses App registrations to perform illicit consent grant attack.
webmaster03668
May 19, 20219 min read
bottom of page

