Browse Skills
Exploiting Kerberoasting With Impacket
v1.0.0Perform Kerberoasting attacks using Impacket's GetUserSPNs to extract and crack Kerberos TGS tickets for Active Directory service accounts.
Exploiting Nosql Injection Vulnerabilities
v1.0.0Detect and exploit NoSQL injection vulnerabilities in MongoDB, CouchDB, and other NoSQL databases to demonstrate authentication bypass, data extraction, and unauthorized access risks.
Exploiting Prototype Pollution In Javascript
v1.0.0Detect and exploit JavaScript prototype pollution vulnerabilities on both client-side and server-side applications to achieve XSS, RCE, and authentication bypass through property injection.
Exploiting Server Side Request Forgery
v1.0.0Identifying and exploiting SSRF vulnerabilities to access internal services, cloud metadata, and restricted network resources during authorized penetration tests.
Exploiting Smb Vulnerabilities With Metasploit
v1.0.0>
Exploiting Type Juggling Vulnerabilities
v1.0.0Exploit PHP type juggling vulnerabilities caused by loose comparison operators to bypass authentication, circumvent hash verification, and manipulate application logic through type coercion attacks.
Extracting Browser History Artifacts
v1.0.0Extract and analyze browser history, cookies, cache, downloads, and bookmarks from Chrome, Firefox, and Edge for forensic evidence of user web activity.
Extracting Config From Agent Tesla Rat
v1.0.0Extract embedded configuration from Agent Tesla RAT samples including SMTP/FTP/Telegram exfiltration credentials, keylogger settings, and C2 endpoints using .NET decompilation and memory analysis.
Extracting Credentials From Memory Dump
v1.0.0Extract cached credentials, password hashes, Kerberos tickets, and authentication tokens from memory dumps using Volatility and Mimikatz for forensic investigation.
Extracting Iocs From Malware Samples
v1.0.0>
Extracting Memory Artifacts With Rekall
v1.0.0>
Extracting Windows Event Logs Artifacts
v1.0.0Extract, parse, and analyze Windows Event Logs (EVTX) using Chainsaw, Hayabusa, and EvtxECmd to detect lateral movement, persistence, and privilege escalation.