Exploiting common Android vulnerabilities.
Bypassing Android certificate pinning using Objection.
Identifying common security issues in mobile applications.
Exploiting common Webmin vulnerabilities.
Performing VLAN hopping attacks.
Exploiting VRRP & HSRP.
Exceeding a network switches CAM table to intercept traffic.
Relaying WebClient Connections to LDAP become a local administrator.
Pentesting SCCM.