Installing A GUI On Linux by evilsaint
27 Apr 2022, 12:09 p.m.Curl For Pentesters by evilsaint
19 Apr 2022, 12:44 p.m.Curl can be used for a number of useful activities during a pentest engagement. It can send HTTP Methods and data to an API endpoint, upload a file to a WebDav Server or grab server response headers, ...
read moreSetting Up A WebDav Server by evilsaint
12 Apr 2022, 2:38 p.m.Dumping RDP Credentials For Logged In User by evilsaint
28 Feb 2022, 12:38 a.m.This article demonstrates how to fix the error "System has not been booted with systemd as init system (PID 1). Can't operate. Failed to connect to bus: Host is down" when using WSL version 2....
read moreCreating SMB Servers by evilsaint
22 Apr 2022, 6:20 p.m.Encoding PowerShell by evilsaint
19 Apr 2022, 12:14 p.m.The use of the `-EncodedCommand` PowerShell parameter is typically used by Administrators to run complex scripts without having to worry about escaping characters. However, it is commonly used by adve...
read moreLinux Privilege Escalation Commands by evilsaint
11 Apr 2022, 10:59 a.m.To exploit systems, attackers utilise a technique known as "enumeration" to find flaws that could lead to privilege escalation. Privilege Escalation is where a user can get elevated access to resource...
read moreWSL2 - Installing Metasploit Framework with Kali Linux by at0mik
25 Feb 2022, 4:04 p.m.This article demonstrates how to install the Metasploit Framework with Kali Linux on WSL2....
read more