🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Post Exploitation

7
Total Entries
7
Contributors

Top Contributors

Nikhil Mittal(2) Aravindha Hariharan(1) Bharadwaj Machiraju(1) Francis Alexander(1) Pratik Shah(1)

All Entries (7 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-03-13TalkInsomnihack Beyond LSASS: Cutting-Edge Techniques for Undetectable Threat Emulation Video Priyank Nigampost-exploitationlateral-movement
2021-10-13Tool demoRootcon Buzzard : Crafting your post exploitation framework against odds Presentation Aravindha Hariharan, Subhajeet Singhapentestingpost-exploitationprivilege-escalation+2
2019-08-08TalkDefcon Anatomy of cloud hacking Pratik Shahcloud-pentestingpost-exploitationcloud-architecture+1
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Bharadwaj Machirajupentestingapplication-pentestingvulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Francis Alexanderpentestingapplication-pentestingvulnerability-assessment+4
2015-08-08TalkDefcon Powershell for Penetraton Testers Video Nikhil Mittalpentestingred-teamingexploitation+3
2012-07-22Tool demoBlackhat Kautilya and Nishang Source Code Nikhil Mittalpost-exploitationethical-hackingpentesting+2