Category: Exploitation

 

How to make a local web server accessible from the Internet without a white IP

Pass-the-hash attack (how to use NTLM without cracking a password)

How to find and analyze information in RAM

How to open and exploit .DS_Store

Attack on devices in the local network through a vulnerable router

How to bypass two-factor authentication with evilginx2

Network pivoting: concept, examples, techniques, tools

How to control computers via backdoor

Pupy manual: how to create a backdoor

How to install Pupy