π READ
Learn how to tune Nmap to get port scans completed faster without negatively impacting scan accuracy, or causing an outage.
π READ
How to use Nmap to perform accurate port scans assets, understand frequently overlooked options (including the defaults!) that lead to inaccurate scan results.
π READ
In this article I propose a new tool oneshell to solve some of the problems with existing reverse shell tooling.
π₯ WATCH
Kubernetes pentesting. Enumeration, lateral movement and privesc with Kubehound.
π₯ WATCH
The aim of this presentation is understanding the art of user impersonation in Windows systems.
π READ
I present a new technique involving signed minifilters to disable EDR systems.
π READ
We regularly challenge and beat Fortune500 defenses. Often times, a decent ADCS honeypot could have stopped us. So we built one.
π READ
Compromise of an SCCM administrator can lead to compromise of every machine managed by SCCM. SCCM administrators must be considered highly privileged accounts.
π READ
Delve into the modern techniques and security controls surrounding password spraying. This will explore the current TTPs for password spraying.
π READ
Nighthawkβs 0.3 release is probably the most significant and impactful change to the framework since its creation.
π₯ WATCH
This script would allow red teams get windows passwords in cleartext which can be useful in pentest engagements.
π READ
This article is not about something new, but rather a report on my research into password policies in an Active Directory environment.
Pentest List is a curation of the latest top-rated tools and content in penetration testing and security defense. Discover cutting-edge tools, blogs, and more, covering port scanning, SQL injection, and a wide range of other vulnerability exploits.
2024 Pentest List, All Rights Reserved.