Creating a ClickOnce installer for Phishing campaigns.
Exploiting constrained, unconstrained and resource based delegation.
Process Injection using NtCreateSection and NtMapViewOfSection.
Fuzzing Network Protocols with the BooFuzz Python library.
File format fuzzing with American Fuzzy Lop++.
Analysing Network Protocols to identify vulnerabilities.
Pentesting the Modbus protocol.
Security testing for Kubernetes clusters.
Performing security audits of Docker instances.
Privilege escalation techniques for Linux hosts.
Privilege escalation techniques for Windows hosts.
LSA protections and related bypass methods.