Similar Tracks
Manually Parse Bloodhound Data with JQ to Create Lists of Potentially Vulnerable Users and Computers
IppSec
Basic Linux Memory Forensics - Dumping Memory and Files with DD - Analyzing Metttle/Meterpreter
IppSec
Executing Linux Binaries Without Touching Disk - Living Off The Land with DDExec and Dirty Pipe Demo
IppSec
Combining AD Honey Pot Accounts with Canaries to Detect Password Sprays and Kerberoasting for free!
IppSec