Encoding PowerShell by evilsaint
19 Apr 2022, 12:14 p.m.The use of the `-EncodedCommand` PowerShell parameter is typically used by Administrators to run complex scripts without having to worry about escaping characters. However, it is commonly used by adve...
read moreWSL2 - Installing Metasploit Framework with Kali Linux by at0mik
25 Feb 2022, 4:04 p.m.This article demonstrates how to install the Metasploit Framework with Kali Linux on WSL2....
read moreSecurity Log Reference by evilsaint
17 Feb 2022, 7:36 p.m.Linux Privilege Escalation Commands by evilsaint
11 Apr 2022, 10:59 a.m.To exploit systems, attackers utilise a technique known as "enumeration" to find flaws that could lead to privilege escalation. Privilege Escalation is where a user can get elevated access to resource...
read moreThis article demonstrates how to fix the error "System has not been booted with systemd as init system (PID 1). Can't operate. Failed to connect to bus: Host is down" when using WSL version 2....
read more