A Mimikatz command reference.
Generating forged Kerberos gold, silver and diamond tickets.
A PowerView command reference.
Setting up Obfuscator LLVM with Visual Studio 2022.
Converting shellcode to look like a series of IP addresses.
Replacing existing ROR13 function hash names in shellcode to evade signature based detection.
Executing Shellcode from the address space of known good DLL’s.
Executing Shellcode using function callbacks.
Creating a C++ DLL to modify a target applications behaviour.
Walking an x64 call stack using UNWIND data structures.
Ways of making payloads a little less suspicious.
Using user-mode APC functions to execute code in remote processes.