Cybersecurity Blogs
My personal blog.
Tunneling and Pivoting
Ever get that initial shell on a target, see another network segment you can't reach, and dread the hassle of setting up a pivot? What if I told you there's a better way?.
Read More →Linux Privilege Escalation.
Hello hackers, I've finally decided to put together all of the different ways to perform privilege escalation on a Linux system .
Read More →Windows Privilege Escalation
This blog covers Windows Privilege Escalation techniques, enumeration commands, and exploitation paths for common privileges such as SeImpersonatePrivilege, SeDebugPrivilege, SeTakeOwnershipPrivilege, Backup Operators, DnsAdmins, and more.
Read More →More blogs coming soon...