-
Find Something
-
Catgoreez
- cons (1)
- Documentary (3)
- Exploits (2)
- Fun (1)
- General (2)
- Hackers for Hire (11)
- Post Exploitation (2)
- rant (1)
- Script (2)
- shellcode (3)
- Tools (5)
- Tutorial (13)
- Videos (3)
Author Archives: admin.au
Very Simple Caesar Cipher (Python)
post exploitation: finding passwords in haystacks
Often while conducting an internal pentest you may gain access to a user machine through some vulnerability or more commonly via social engineering. Let’s say that you pop a shell, unprivileged, and incognito only finds unprivileged domain tokens. You could move onto another target or you can try some post…