πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Post Exploitation

Focus Area: 🎯 Penetration Testing
10
Total Entries
9
Contributors

Top Contributors

Bharadwaj Machiraju(3) Francis Alexander(2) Nikhil Mittal(2) Soumyanil Biswas(2) Aravindha Hariharan(1)

All Entries (10 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-03-13TalkInsomnihack Beyond LSASS: Cutting-Edge Techniques for Undetectable Threat Emulation Video Priyank Nigam#post-exploitation#lateral-movement#identity-management
2024-08-07Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool targeting Windows Source Code Soumyanil Biswas, Chirag Savla#red-teaming#malware-research#post-exploitation+2
2024-04-18Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool (or can be used in both situations) targeting Windows Source Code Soumyanil Biswas#red-teaming#post-exploitation#windows
2021-10-13Tool demoRootcon Buzzard : Crafting your post exploitation framework against odds Presentation Aravindha Hariharan, Subhajeet Singha#security-assessment#post-exploitation#privilege-escalation+2
2019-08-08TalkDefcon Anatomy of cloud hacking Pratik Shah#cloud-pentesting#post-exploitation#architecture+1
2017-03-24TalkInsomnihack How we hacked Distributed Configuration Management Systems Francis Alexander, Bharadwaj Machiraju#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Video Bharadwaj Machiraju, Francis Alexander#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Video Francis Alexander, Bharadwaj Machiraju#security-assessment#application-pentesting#vulnerability-assessment+4
2015-08-08TalkDefcon Powershell for Penetraton Testers Video Nikhil Mittal#security-assessment#red-teaming#exploitation+3
2012-07-22Tool demoBlackhat Kautilya and Nishang Source Code Nikhil Mittal#post-exploitation#ethical-hacking#security-assessment+1