Encoding PowerShell by evilsaint

19 Apr 2022, 12:14 p.m.

The use of the `-EncodedCommand` PowerShell parameter is typically used by Administrators to run complex scripts without having to worry about escaping characters. However, it is commonly used by adve...

read more

This article demonstrates how to install the Metasploit Framework with Kali Linux on WSL2....

read more

Security Log Reference by evilsaint

17 Feb 2022, 7:36 p.m.

This article serves as a quick reference for Windows Security Log event IDs....

read more

To exploit systems, attackers utilise a technique known as "enumeration" to find flaws that could lead to privilege escalation. Privilege Escalation is where a user can get elevated access to resource...

read more

This article demonstrates how to fix the error "System has not been booted with systemd as init system (PID 1). Can't operate. Failed to connect to bus: Host is down" when using WSL version 2....

read more

In this example, we will demonstrate how to exfiltrate secrets through command injection against a serverless function. Serverless functions listen for events or triggers to be run. It is possible to ...

read more