Browse Skills
Executing Diamond Model Analysis
v1.0.0>
Executing Phishing Simulation Campaign
v1.0.0>
Executing Red Team Exercise
v1.0.0>
Exploiting Active Directory Certificate Services Esc1
v1.0.0Exploit misconfigured Active Directory Certificate Services (AD CS) ESC1 vulnerability to request certificates as high-privileged users and escalate domain privileges during authorized red team assessments.
Exploiting Active Directory With Bloodhound
v1.0.0BloodHound is a graph-based Active Directory reconnaissance tool that uses graph theory to reveal hidden and unintended relationships within AD environments. Red teams use BloodHound to identify attac
Exploiting Bgp Hijacking Vulnerabilities
v1.0.0>
Exploiting Broken Function Level Authorization
v1.0.0>
Exploiting Broken Link Hijacking
v1.0.0Discover and exploit broken link hijacking vulnerabilities by identifying references to expired domains, decommissioned cloud resources, and dead external services that can be claimed by an attacker.
Exploiting Constrained Delegation Abuse
v1.0.0Exploit Kerberos Constrained Delegation misconfigurations in Active Directory to impersonate privileged users via S4U2self and S4U2proxy extensions for lateral movement and privilege escalation.
Exploiting Deeplink Vulnerabilities
v1.0.0>
Exploiting Http Request Smuggling
v1.0.0Detecting and exploiting HTTP request smuggling vulnerabilities caused by Content-Length and Transfer-Encoding parsing discrepancies between front-end and back-end servers.
Exploiting Ipv6 Vulnerabilities
v1.0.0>