Hacker For Hire
Facebook Twitter RSS
  Menu
Skip to content
  • Home
  • Downloads
  • Exploits and Vulnerabilities
  • Infosec Blogroll
  • Services
    • Scam Recovery
    • Social Media Hacking
    • Catch Cheating Spouse
    • School Grades Hacking
    • Tailored Services
Facebook Twitter RSS

Category Archives: Post Exploitation

post exploitation: finding passwords in haystacks

By admin.au | June 1, 2025 - 7:20 am |June 1, 2025 Post Exploitation, Tools
Leave a comment

Often while conducting an internal pentest you may gain access to a user machine through some vulnerability or more commonly via social engineering. Let’s say that you pop a shell, unprivileged, and incognito only finds unprivileged domain tokens. You could move onto another target or you can try some post… →

data exfiltration over SSL with srvdir

By admin.au | June 1, 2025 - 7:13 am |June 1, 2025 Post Exploitation, Tools
Leave a comment

 Every now and then I come across some application that may or may not have been developed with penetration testing in mind but it ends up being damn helpful all the same. Yesterday I found a post about ‘srvdir‘ (surv~durr?) which is designed to share content over SSL/TLS via… →

  • Recent Posts

    • installing unicornscan on debian/ubuntu
    • part 3: cleaning and optimising shellcode
    • part 2: building the shellcode
    • part 1: disassembling and understanding shellcode
    • using perl to grab IP addresses of multiple hostnames
  • Recent Comments

    No comments to show.
  • Archives

    • June 2025
  • Categories

    • cons
    • Documentary
    • Exploits
    • Fun
    • General
    • Post Exploitation
    • rant
    • Script
    • shellcode
    • Tools
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nulla massa diam, tempus a finibus et, euismod nec arcu. Praesent ultrices massa at molestie facilisis.
Hacker For Hire | Powered by Mantra & WordPress.
Facebook Twitter RSS