I'm passionate about making the digital world safer for everyone. Join me as I dive into the latest in cybersecurity, sharing my adventures along the way.
Popular repositories Loading
-
-
Living-off-the-COM-Type-Coercion-Abuse
Living-off-the-COM-Type-Coercion-Abuse PublicThis technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit type coercion
-
NTLMv2-Hash-Leak-via-COM-Auto-Execution
NTLMv2-Hash-Leak-via-COM-Auto-Execution PublicNTLMv2 Hash Leak via COM + Auto-Execution
HTML 8
-
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.