{"version":1,"pages":[{"id":"68cGXNMZYE2IoxFxRSY2","title":"Welcome!","pathname":"/","siteSpaceId":"sitesp_23Sqz","description":"Welcome to my Playbook where I take notes."},{"id":"6EzNh7i99tYfodPES45i","title":"Web App Pentesting","pathname":"/web-app-pentesting","siteSpaceId":"sitesp_23Sqz","description":"All about Web Application penetration testing"},{"id":"ZoSvZAgk5BFTi4STy9T8","title":"SQL Injection","pathname":"/web-app-pentesting/sql-injection","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"oMB0ZJXDzDx891q42Dxx","title":"NoSQL Injection","pathname":"/web-app-pentesting/nosql-injection","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"YhKOLGPRL6D2soWqdTg4","title":"XSS","pathname":"/web-app-pentesting/xss","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"jPChIEFHeaPALJ6mFfrr","title":"CSRF","pathname":"/web-app-pentesting/csrf","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"ujJQYaojY8XpYPQC18ES","title":"SSRF","pathname":"/web-app-pentesting/ssrf","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"OvOrdmQSO7tfspp7IEH0","title":"XXE","pathname":"/web-app-pentesting/xxe","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"zx5bFktT5oBuWImTiO46","title":"IDOR","pathname":"/web-app-pentesting/idor","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"BhwbnczYaLurVs5hCbJT","title":"SSTI","pathname":"/web-app-pentesting/ssti","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"rJJGAKmieu1IKGVcdA7M","title":"Broken Access Control/Privilege Escalation","pathname":"/web-app-pentesting/broken-access-control-privilege-escalation","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"aD1naPvxyXwX6czZukuu","title":"Open Redirect","pathname":"/web-app-pentesting/open-redirect","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"SpyLb417jL0Xjh1j7O1w","title":"File Inclusion","pathname":"/web-app-pentesting/file-inclusion","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"RboBTTVbXotB8tHWUbsT","title":"File Upload","pathname":"/web-app-pentesting/file-upload","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"7hEtHdNaDsZj6NMFKh5M","title":"Insecure Deserialization","pathname":"/web-app-pentesting/insecure-deserialization","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"xcWTLeclMmZkdqmgyWUe","title":"XMLDecoder","pathname":"/web-app-pentesting/insecure-deserialization/xmldecoder","siteSpaceId":"sitesp_23Sqz","description":"XMLDecoder Lab from PentesterLab or NullCon 2016 CTF","breadcrumbs":[{"label":"Web App Pentesting"},{"label":"Insecure Deserialization"}]},{"id":"eIS3LhMlj9isPVhVczgU","title":"LDAP Injection","pathname":"/web-app-pentesting/ldap-injection","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"PRuD9zFNJOC84FjhBUw9","title":"XPath Injection","pathname":"/web-app-pentesting/xpath-injection","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"7u6fZmmpip3LbbgXblAF","title":"JWT","pathname":"/web-app-pentesting/jwt","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"AVoJ1gB453c2BOqskeGA","title":"Parameter Pollution","pathname":"/web-app-pentesting/parameter-pollution","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"SFihEKfnJj7jpzpO5NUG","title":"Prototype Pollution","pathname":"/web-app-pentesting/prototype-pollution","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"TfxPFdspHEmQU9gfXfhb","title":"Race Conditions","pathname":"/web-app-pentesting/race-conditions","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"6QO58TffPMW4jF2av3Ff","title":"CRLF Injection","pathname":"/web-app-pentesting/crlf-injection","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"Fz4lK3h44wscDWmr6x4x","title":"LaTeX Injection","pathname":"/web-app-pentesting/latex-injection","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"SRn59ZxaKBcp5Mb5ZYTR","title":"CORS Misconfiguration","pathname":"/web-app-pentesting/cors-misconfiguration","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"8YecJHuzNErFpHVQzBSY","title":"Handy Commands & Payloads","pathname":"/web-app-pentesting/handy-commands-and-payloads","siteSpaceId":"sitesp_23Sqz","description":"Commands and Payloads that I use the most to get the basics covered.","breadcrumbs":[{"label":"Web App Pentesting"}]},{"id":"VNVmOTEC6TyRdLwvGjvf","title":"Active Directory Pentest","pathname":"/active-directory-pentest","siteSpaceId":"sitesp_23Sqz","description":""},{"id":"UXOitZma07Ru1LvkzNot","title":"Domain Enumeration","pathname":"/active-directory-pentest/domain-enumeration","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"}]},{"id":"lB9o2QdyA6fcDBF0K4xV","title":"User Enumeration","pathname":"/active-directory-pentest/domain-enumeration/user-enumeration","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Enumeration"}]},{"id":"JI2muux3gP6gF3PtZGee","title":"Group Enumeration","pathname":"/active-directory-pentest/domain-enumeration/group-enumeration","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Enumeration"}]},{"id":"5IHQ2YJD2wQLei6GqvaI","title":"GPO & OU Enumeration","pathname":"/active-directory-pentest/domain-enumeration/gpo-and-ou-enumeration","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Enumeration"}]},{"id":"Lgjm3KPcP5bdKK1Bg4fs","title":"ACLs","pathname":"/active-directory-pentest/domain-enumeration/acls","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Enumeration"}]},{"id":"dP32wrwIprlyYkblULgH","title":"Trusts","pathname":"/active-directory-pentest/domain-enumeration/trusts","siteSpaceId":"sitesp_23Sqz","description":"Domain Trust Mapping","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Enumeration"}]},{"id":"9uYleY9FiIbWEYARJNNV","title":"User Hunting","pathname":"/active-directory-pentest/domain-enumeration/user-hunting","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Enumeration"}]},{"id":"UOCJDw4u6pqdhQ4GMTeA","title":"Domain Privilege Escalation","pathname":"/active-directory-pentest/domain-privilege-escalation","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"}]},{"id":"9lonTo3z1F9Kne6M6eVL","title":"Kerberoast","pathname":"/active-directory-pentest/domain-privilege-escalation/kerberoast","siteSpaceId":"sitesp_23Sqz","description":"Compromise Domain User, request TGS for service account. TGS is encrypted with hashed version of account's password. Offline cracking of service account passwords.","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"}]},{"id":"3LIZYhqQxQfjwgFo9ye3","title":"AS-REP Roast (Kerberoasting)","pathname":"/active-directory-pentest/domain-privilege-escalation/kerberoast/as-rep-roast-kerberoasting","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Kerberoast"}]},{"id":"eC49Ev9TvGOaHnYLKmBL","title":"CRTP Lab 14","pathname":"/active-directory-pentest/domain-privilege-escalation/kerberoast/crtp-lab-14","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Kerberoast"}]},{"id":"03Ew59zOG8XRAwRwXmDm","title":"Targeted Kerberoasting","pathname":"/active-directory-pentest/domain-privilege-escalation/targeted-kerberoasting","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"}]},{"id":"OJKPgq6aP26D0ajC2CoV","title":"AS-REP Roast","pathname":"/active-directory-pentest/domain-privilege-escalation/targeted-kerberoasting/as-rep-roast","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Targeted Kerberoasting"}]},{"id":"pQkUXajSaxLxDrliUD7G","title":"Set SPN","pathname":"/active-directory-pentest/domain-privilege-escalation/targeted-kerberoasting/set-spn","siteSpaceId":"sitesp_23Sqz","description":"Once an account has an SPN, it becomes vulnerable to Kerberoasting.","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Targeted Kerberoasting"}]},{"id":"cAFfrabZBbSxyQhHtalL","title":"Kerberos Delegation","pathname":"/active-directory-pentest/domain-privilege-escalation/kerberos-delegation","siteSpaceId":"sitesp_23Sqz","description":"It allows the \"reuse of end-user credentials to access resources hosted on a different server\".","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"}]},{"id":"EJXQpzcf7AgyF7JyL6AX","title":"Unconstrained Delegation","pathname":"/active-directory-pentest/domain-privilege-escalation/kerberos-delegation/unconstrained-delegation","siteSpaceId":"sitesp_23Sqz","description":"A machine with unconstrained delegation caches creds of users connecting to it. To capture it these creds,we use Printer Bug which tricks the user to connect to the machine w Unconstrained Delegation.","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Kerberos Delegation"}]},{"id":"WCU3nLRleYDWgUr0h96u","title":"CRTP Lab 15","pathname":"/active-directory-pentest/domain-privilege-escalation/kerberos-delegation/unconstrained-delegation/crtp-lab-15","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Kerberos Delegation"},{"label":"Unconstrained Delegation"}]},{"id":"d5HW8B1Ij7iwvuP3ACeM","title":"Constrained Delegation","pathname":"/active-directory-pentest/domain-privilege-escalation/kerberos-delegation/constrained-delegation","siteSpaceId":"sitesp_23Sqz","description":"Domain Admin can allow a computer to impersonate a user or computer against a service of a machine.","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Kerberos Delegation"}]},{"id":"YM1DDSxIqu7ShroOuIqx","title":"CRTP Lab 16","pathname":"/active-directory-pentest/domain-privilege-escalation/kerberos-delegation/constrained-delegation/crtp-lab-16","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Kerberos Delegation"},{"label":"Constrained Delegation"}]},{"id":"wA4Cfa93a4PmRL0LAm9d","title":"Resource Based Constrained Delegation (RBCD)","pathname":"/active-directory-pentest/domain-privilege-escalation/kerberos-delegation/resource-based-constrained-delegation-rbcd","siteSpaceId":"sitesp_23Sqz","description":"Similar to Constrained Delegation but instead of giving permissions to an object to impersonate any user against a service. RBCD sets in the object who is able to impersonate any user against it.","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Kerberos Delegation"}]},{"id":"TIyYKfhQsU0d8k5ybrAg","title":"CRTP Lab 17","pathname":"/active-directory-pentest/domain-privilege-escalation/kerberos-delegation/resource-based-constrained-delegation-rbcd/crtp-lab-17","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Kerberos Delegation"},{"label":"Resource Based Constrained Delegation (RBCD)"}]},{"id":"pBlrGany0sV21ugNzI7V","title":"Across Trusts","pathname":"/active-directory-pentest/domain-privilege-escalation/across-trusts","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"}]},{"id":"Xr15njaEIBZwFMErmS7F","title":"Child to Parent (Cross Domain)","pathname":"/active-directory-pentest/domain-privilege-escalation/across-trusts/child-to-parent-cross-domain","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Across Trusts"}]},{"id":"xfCMibFgT5OcsLCI97ws","title":"Using Trust Tickets","pathname":"/active-directory-pentest/domain-privilege-escalation/across-trusts/child-to-parent-cross-domain/using-trust-tickets","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Across Trusts"},{"label":"Child to Parent (Cross Domain)"}]},{"id":"oXIKjTHYL5GRjmcgceCo","title":"CRTP Lab 18","pathname":"/active-directory-pentest/domain-privilege-escalation/across-trusts/child-to-parent-cross-domain/using-trust-tickets/crtp-lab-18","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Across Trusts"},{"label":"Child to Parent (Cross Domain)"},{"label":"Using Trust Tickets"}]},{"id":"8fb3Zc28Hfn7tMqd4NGl","title":"Using KRBTGT Hash","pathname":"/active-directory-pentest/domain-privilege-escalation/across-trusts/child-to-parent-cross-domain/using-krbtgt-hash","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Across Trusts"},{"label":"Child to Parent (Cross Domain)"}]},{"id":"acaE5w2u7KeI01Rve6AA","title":"CRTP Lab 19","pathname":"/active-directory-pentest/domain-privilege-escalation/across-trusts/child-to-parent-cross-domain/using-krbtgt-hash/crtp-lab-19","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Across Trusts"},{"label":"Child to Parent (Cross Domain)"},{"label":"Using KRBTGT Hash"}]},{"id":"ruuLEF3zAxyYzm26oGDy","title":"Cross Forest","pathname":"/active-directory-pentest/domain-privilege-escalation/across-trusts/cross-forest","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Across Trusts"}]},{"id":"4bgyL1UPMKQdVUU0fFyr","title":"Lab 20","pathname":"/active-directory-pentest/domain-privilege-escalation/across-trusts/cross-forest/lab-20","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Across Trusts"},{"label":"Cross Forest"}]},{"id":"UPG8RderjpP477wlL0Dj","title":"AD CS (Across Domain Trusts)","pathname":"/active-directory-pentest/domain-privilege-escalation/across-trusts/ad-cs-across-domain-trusts","siteSpaceId":"sitesp_23Sqz","description":"Active Directory Certificate Services (AD CS) enables use of Public Key Infrastructure (PKI) in active directory forest.","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Across Trusts"}]},{"id":"BpI2SAkK0aGSYtDxqyA4","title":"ESC1","pathname":"/active-directory-pentest/domain-privilege-escalation/across-trusts/ad-cs-across-domain-trusts/esc1","siteSpaceId":"sitesp_23Sqz","description":"Enrollee can request cert for ANY user.","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Across Trusts"},{"label":"AD CS (Across Domain Trusts)"}]},{"id":"mTYRHUbAbSKIOFs6eR7f","title":"CRTP Lab 21","pathname":"/active-directory-pentest/domain-privilege-escalation/across-trusts/ad-cs-across-domain-trusts/esc1/crtp-lab-21","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Across Trusts"},{"label":"AD CS (Across Domain Trusts)"},{"label":"ESC1"}]},{"id":"GMRw35eqK1cAE3xwD4kr","title":"Trust Abuse - MSSQL Servers","pathname":"/active-directory-pentest/domain-privilege-escalation/across-trusts/trust-abuse-mssql-servers","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Across Trusts"}]},{"id":"OKJcumUNo6oFRiC1Emx7","title":"CRTP Lab 22","pathname":"/active-directory-pentest/domain-privilege-escalation/across-trusts/trust-abuse-mssql-servers/crtp-lab-22","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Domain Privilege Escalation"},{"label":"Across Trusts"},{"label":"Trust Abuse - MSSQL Servers"}]},{"id":"hxUK0vvX1FWJ8KWqAuuv","title":"Lateral Movement","pathname":"/active-directory-pentest/lateral-movement","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"}]},{"id":"cTzoOHsCIppag2cZMQpa","title":"PowerShell Remoting","pathname":"/active-directory-pentest/lateral-movement/powershell-remoting","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Lateral Movement"}]},{"id":"SD7HaIzrjJKtBo9vdFiw","title":"Extracting Creds, Hashes, Tickets","pathname":"/active-directory-pentest/lateral-movement/extracting-creds-hashes-tickets","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Lateral Movement"}]},{"id":"7HNnUX7DUpP5hRCrlM8f","title":"Over-PassTheHash","pathname":"/active-directory-pentest/lateral-movement/over-passthehash","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Lateral Movement"}]},{"id":"DaIWVhK991VHocntRNnP","title":"DCSync","pathname":"/active-directory-pentest/lateral-movement/dcsync","siteSpaceId":"sitesp_23Sqz","description":"DCSync is a technique used to extract credentials from the Domain Controllers.","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Lateral Movement"}]},{"id":"w3p119s3lDa6ooFRGGGZ","title":"Evasion","pathname":"/active-directory-pentest/evasion","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"}]},{"id":"NDgy8emw85SeGQAhj5XO","title":"Evasion Cheetsheet","pathname":"/active-directory-pentest/evasion/evasion-cheetsheet","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Evasion"}]},{"id":"c1CYel6wInoqIiGiMZe1","title":"Persistence","pathname":"/active-directory-pentest/persistence","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"}]},{"id":"QULAfXRNMgcQwx64IlZb","title":"Golden Ticket","pathname":"/active-directory-pentest/persistence/golden-ticket","siteSpaceId":"sitesp_23Sqz","description":"A Golden Ticket attack consist of the creating of a legitimate Ticket Granting Ticket (TGT) that impersonates any user through the use of the NTLM hash of the krbtgt account. (Unlimited Access to AD).","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"}]},{"id":"xSWOzMCg1pkwqzq1NqEd","title":"CRTP Lab 8","pathname":"/active-directory-pentest/persistence/golden-ticket/crtp-lab-8","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"},{"label":"Golden Ticket"}]},{"id":"KDxvsKBjq9GVKWmisDsw","title":"Silver Ticket","pathname":"/active-directory-pentest/persistence/silver-ticket","siteSpaceId":"sitesp_23Sqz","description":"Unlike Golden Ticket where we forge TGT using krbtgt hash, Silver Ticket attack forges a TGS for a specific service without needing to pwn KDC or krbtgt. We only need the NTLM hash of service account.","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"}]},{"id":"iM5mj6O7PKXQ4xCbeW4f","title":"CRTP Lab 9","pathname":"/active-directory-pentest/persistence/silver-ticket/crtp-lab-9","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"},{"label":"Silver Ticket"}]},{"id":"QDLHvg1KSFu63lvfChjI","title":"Diamond Ticket","pathname":"/active-directory-pentest/persistence/diamond-ticket","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"}]},{"id":"Ow7XqUS5FcXYea4vaBEW","title":"CRTP Lab 10","pathname":"/active-directory-pentest/persistence/diamond-ticket/crtp-lab-10","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"},{"label":"Diamond Ticket"}]},{"id":"tHqteepPQJXFM5zqd4PZ","title":"Skeleton Key","pathname":"/active-directory-pentest/persistence/skeleton-key","siteSpaceId":"sitesp_23Sqz","description":"Skeleton Key attack bypasses AD authentication by injecting a master password into the DC. We can access any user using this master password.","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"}]},{"id":"HgfWP9bp944astgPP8Yo","title":"DSRM","pathname":"/active-directory-pentest/persistence/dsrm","siteSpaceId":"sitesp_23Sqz","description":"If we have admin privileges on a DC, we can dump local admin hash and then activate this local admin user to remotely access it.","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"}]},{"id":"QRkjN9zmWMcLm8ugUIDo","title":"CRTP Lab 11","pathname":"/active-directory-pentest/persistence/dsrm/crtp-lab-11","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"},{"label":"DSRM"}]},{"id":"udTGq9xwwsFFGEuMbLmA","title":"Custom SSP","pathname":"/active-directory-pentest/persistence/custom-ssp","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"}]},{"id":"k4J2THgnvZwRHqz12Ne7","title":"Using ACLs","pathname":"/active-directory-pentest/persistence/using-acls","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"}]},{"id":"gjWQabTdS1kK0ucp7i03","title":"AdminSDHolder","pathname":"/active-directory-pentest/persistence/using-acls/adminsdholder","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"},{"label":"Using ACLs"}]},{"id":"j1TrJc4ioD9Y4Yavlok8","title":"Rights Abuse","pathname":"/active-directory-pentest/persistence/using-acls/rights-abuse","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"},{"label":"Using ACLs"}]},{"id":"7sbSbEk8XO2geSxWCN4H","title":"CRTP Lab 12","pathname":"/active-directory-pentest/persistence/using-acls/rights-abuse/crtp-lab-12","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"},{"label":"Using ACLs"},{"label":"Rights Abuse"}]},{"id":"bj4hC6GUL9hFUhf5cU6q","title":"Security Descriptors","pathname":"/active-directory-pentest/persistence/using-acls/security-descriptors","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"},{"label":"Using ACLs"}]},{"id":"RX5C8dwuzH5p4HwonSkz","title":"CRTP Lab 13","pathname":"/active-directory-pentest/persistence/using-acls/security-descriptors/crtp-lab-13","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"},{"label":"Persistence"},{"label":"Using ACLs"},{"label":"Security Descriptors"}]},{"id":"WwtvJkGZWPx7xYZSAR4t","title":"Tools","pathname":"/active-directory-pentest/tools","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Active Directory Pentest"}]},{"id":"Q3ozPIEXRLhTCzGfgry9","title":"PowerShell","pathname":"/active-directory-pentest/powershell","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Active Directory Pentest"}]},{"id":"ukQiBlJbb45KXsH43psO","title":"AI Security","pathname":"/ai-security","siteSpaceId":"sitesp_23Sqz","description":"All things related to breaking and securing AI."},{"id":"IweD4IGHCDT7zn9331Zt","title":"LLM Security Checklist","pathname":"/ai-security/llm-security-checklist","siteSpaceId":"sitesp_23Sqz","description":"A checklist for LLM security inspired by OWASP Top 10 for LLMs (2025)","breadcrumbs":[{"label":"AI Security"}]},{"id":"x1ZgaKPsRLtn8zKkTHZt","title":"GenAI Vision Security Checklist","pathname":"/ai-security/genai-vision-security-checklist","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"AI Security"}]},{"id":"ztAWxfsrPLHXIdqEBh2l","title":"Questionnaire for AI/ML/GenAI Engineering Teams","pathname":"/ai-security/questionnaire-for-ai-ml-genai-engineering-teams","siteSpaceId":"sitesp_23Sqz","description":"Questionnaire for devs used by sec engineers during walkthroughs of GenAI applications.","breadcrumbs":[{"label":"AI Security"}]},{"id":"1csO8Ykyyfj4DhSpSQPq","title":"Network Pentesting","pathname":"/network-pentesting","siteSpaceId":"sitesp_23Sqz","description":"All about Network penetration testing"},{"id":"a1ZmtO76R08AqhDrMAvH","title":"Information Gathering","pathname":"/network-pentesting/information-gathering","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"}]},{"id":"gLIOccKus1MsOej9grqD","title":"Scanning","pathname":"/network-pentesting/scanning","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"}]},{"id":"AFELMzxAur0rGJtp151Y","title":"Port/Service Enumeration","pathname":"/network-pentesting/port-service-enumeration","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"}]},{"id":"bNjcdU05g9yEjjdnmyna","title":"21 FTP","pathname":"/network-pentesting/port-service-enumeration/21-ftp","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"X0wK8cnCeXeAiVX82WJb","title":"22 SSH","pathname":"/network-pentesting/port-service-enumeration/22-ssh","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"F715uGUtWYPR3cNHj7Mt","title":"25, 465, 587 SMTP","pathname":"/network-pentesting/port-service-enumeration/25-465-587-smtp","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"inYcIaEMV1HC5cSM0iMz","title":"53 DNS","pathname":"/network-pentesting/port-service-enumeration/53-dns","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"nXCSnTlLA1xbC6rknTBJ","title":"80, 443 HTTP/s","pathname":"/network-pentesting/port-service-enumeration/80-443-http-s","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"h8dfaVUiHZJ8LmhKbpLR","title":"88 Kerberos","pathname":"/network-pentesting/port-service-enumeration/88-kerberos","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"QxtsX3OHTobLgGgpNEeF","title":"135, 593 MSRPC","pathname":"/network-pentesting/port-service-enumeration/135-593-msrpc","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"Mwo1JuL75KgDH25TDBI8","title":"137, 138, 139 NetBios","pathname":"/network-pentesting/port-service-enumeration/137-138-139-netbios","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"hlEr6wHFH0MvMyMHm7ZK","title":"139, 445 SMB","pathname":"/network-pentesting/port-service-enumeration/139-445-smb","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"kFTMRrTLDKPi2P5PKr6e","title":"161, 162, 10161, 10162/udp SNMP","pathname":"/network-pentesting/port-service-enumeration/161-162-10161-10162-udp-snmp","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"EqTglfMXDNMqUyxDDWnv","title":"389, 636, 3268, 3269 LDAP","pathname":"/network-pentesting/port-service-enumeration/389-636-3268-3269-ldap","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"zjEVMeHY2f721l5OmSGh","title":"Untitled","pathname":"/network-pentesting/port-service-enumeration/untitled","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"BBxt0lZ22kfZkXDDGv1P","title":"Page 14","pathname":"/network-pentesting/port-service-enumeration/page-14","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"uwI5AmnrrGcQXkEgN6O2","title":"Page 15","pathname":"/network-pentesting/port-service-enumeration/page-15","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"EYrotBTGvb9subsE4GTZ","title":"Page 16","pathname":"/network-pentesting/port-service-enumeration/page-16","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"9ZOyEfouNQkk4c5hNyvs","title":"Page 17","pathname":"/network-pentesting/port-service-enumeration/page-17","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"oAwHnFQz6UljAHJD37IV","title":"Page 18","pathname":"/network-pentesting/port-service-enumeration/page-18","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"Nt1ijhTstiS7kkr6BQVw","title":"Page 19","pathname":"/network-pentesting/port-service-enumeration/page-19","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"qrbIlqEQ07EA9XzibN06","title":"Page 20","pathname":"/network-pentesting/port-service-enumeration/page-20","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Port/Service Enumeration"}]},{"id":"3Mz5uKx51Vz7r4UhlHFY","title":"Nessus","pathname":"/network-pentesting/nessus","siteSpaceId":"sitesp_23Sqz","description":"Vulnerability Assessment and Management","breadcrumbs":[{"label":"Network Pentesting"}]},{"id":"NjLozhoB4LgmiAnyCmel","title":"Checklist","pathname":"/network-pentesting/checklist","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Network Pentesting"}]},{"id":"C2H8Ur7g63jKVaIUyEfg","title":"Mobile Pentesting","pathname":"/mobile-pentesting","siteSpaceId":"sitesp_23Sqz","description":"All about Mobile penetration testing."},{"id":"wCujL3m8hL6T4Kt4QXiJ","title":"Android","pathname":"/mobile-pentesting/android","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Mobile Pentesting"}]},{"id":"VpZ3MJyYEKhPsX8JGBFD","title":"Android PenTest Setup","pathname":"/mobile-pentesting/android/android-pentest-setup","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Mobile Pentesting"},{"label":"Android"}]},{"id":"SRFKweiIpRDM4Wqd24mS","title":"Tools","pathname":"/mobile-pentesting/android/tools","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Mobile Pentesting"},{"label":"Android"}]},{"id":"USwLTvNYFOf6zR7XwToe","title":"iOS","pathname":"/mobile-pentesting/ios","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Mobile Pentesting"}]},{"id":"XzbPL5F7DRTK5VAsbj9U","title":"DevSecOps","pathname":"/devsecops","siteSpaceId":"sitesp_23Sqz","description":"Development, Security, Operations"},{"id":"IHQplfpR4jcKJDNu0hQC","title":"Building CI Pipeline","pathname":"/devsecops/building-ci-pipeline","siteSpaceId":"sitesp_23Sqz","description":"Using OWASP Juiceshop and GitLab to build CI Pipeline.","breadcrumbs":[{"label":"DevSecOps"}]},{"id":"apBMeRawyVhOQ3U1VWT0","title":"Threat Modeling","pathname":"/devsecops/threat-modeling","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"}]},{"id":"cL9TLHaus0DlS2vupZS1","title":"Secure Coding","pathname":"/devsecops/secure-coding","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"}]},{"id":"HeNlMsUbidi3hAMtvzBX","title":"Code Review Examples","pathname":"/devsecops/secure-coding/code-review-examples","siteSpaceId":"sitesp_23Sqz","description":"Common Culprits","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"}]},{"id":"PN4hxe3EfZcpS3tNHkeF","title":"Broken Access Control","pathname":"/devsecops/secure-coding/code-review-examples/broken-access-control","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"uxYqVfxT4r1Oa3cWJn8i","title":"Broken Authentication","pathname":"/devsecops/secure-coding/code-review-examples/broken-authentication","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"cHVfqIpSEFtwMpZJ3mgE","title":"Command Injection","pathname":"/devsecops/secure-coding/code-review-examples/command-injection","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"lhsOtUyFPU08joPl0znY","title":"SQLi","pathname":"/devsecops/secure-coding/code-review-examples/sqli","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"3KmGI4ygJ4805jfVEPpu","title":"XSS","pathname":"/devsecops/secure-coding/code-review-examples/xss","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"LqlcIKKQgmqdyNQu5YO5","title":"XXE","pathname":"/devsecops/secure-coding/code-review-examples/xxe","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"3sBj785aJ7m641urO99E","title":"SSRF","pathname":"/devsecops/secure-coding/code-review-examples/ssrf","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"R2ydnHzEEThcKEhjOIyS","title":"SSTI","pathname":"/devsecops/secure-coding/code-review-examples/ssti","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"CxduXjeFhCnzfXqebNXA","title":"CSRF","pathname":"/devsecops/secure-coding/code-review-examples/csrf","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"Ps99a6QOznMFH5PBtGGc","title":"Insecure Deserialization","pathname":"/devsecops/secure-coding/code-review-examples/insecure-deserialization","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"SQpThLtEiypUF9ojOWKE","title":"XPath Injection","pathname":"/devsecops/secure-coding/code-review-examples/xpath-injection","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"744iwkKM2oakOLs7TWHg","title":"LDAP Injection","pathname":"/devsecops/secure-coding/code-review-examples/ldap-injection","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"cFPastLUl2hN1vEtMmMP","title":"Insecure File Uploads","pathname":"/devsecops/secure-coding/code-review-examples/insecure-file-uploads","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"9jaEVW9bLFh62RJZb14D","title":"Path Traversal","pathname":"/devsecops/secure-coding/code-review-examples/path-traversal","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"TcB7FaSZYHnaQori5gPI","title":"LFI","pathname":"/devsecops/secure-coding/code-review-examples/lfi","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"zMPx34V9zufqf6eSkLxa","title":"RFI","pathname":"/devsecops/secure-coding/code-review-examples/rfi","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"PFzKhK0zO9Z2ILwIlYhm","title":"Prototype Pollution","pathname":"/devsecops/secure-coding/code-review-examples/prototype-pollution","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"Y2rtFL6hbfVzJ6SwmeC5","title":"Connection String Injection","pathname":"/devsecops/secure-coding/code-review-examples/connection-string-injection","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"Y6O2XGnxKZIDwqrV0eL7","title":"Sensitive Data Exposure","pathname":"/devsecops/secure-coding/code-review-examples/sensitive-data-exposure","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"vr4vQTUG0TDBkwESJSjf","title":"Security Misconfigurations","pathname":"/devsecops/secure-coding/code-review-examples/security-misconfigurations","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"98CSFhBbGlaPFbeijKpp","title":"Buffer Overflow","pathname":"/devsecops/secure-coding/code-review-examples/buffer-overflow","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"abukZYszwmArJz2DRFe1","title":"Integer Overflow","pathname":"/devsecops/secure-coding/code-review-examples/integer-overflow","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"kONW86afwtsg7w9ptlKj","title":"Symlink Attack","pathname":"/devsecops/secure-coding/code-review-examples/symlink-attack","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"LFTBbyayp9JzlX3jQln5","title":"Use After Free","pathname":"/devsecops/secure-coding/code-review-examples/use-after-free","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"e8Ks03C5L9F4BMIpcDyr","title":"Out of Bounds","pathname":"/devsecops/secure-coding/code-review-examples/out-of-bounds","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"},{"label":"Code Review Examples"}]},{"id":"s1KeGz9xMRMRH81CdoXf","title":"C/C++ Secure Coding","pathname":"/devsecops/secure-coding/c-c++-secure-coding","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"}]},{"id":"clyXLXxsgKg2IgkfS55Q","title":"Java/JS Secure Coding","pathname":"/devsecops/secure-coding/java-js-secure-coding","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"}]},{"id":"1rQ4FEM0ZLGsA8iGWseQ","title":"Python Secure Coding","pathname":"/devsecops/secure-coding/python-secure-coding","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"DevSecOps"},{"label":"Secure Coding"}]},{"id":"7Un7z8MAcQvRewlXam9v","title":"Malware Dev","pathname":"/malware-dev","siteSpaceId":"sitesp_23Sqz","description":""},{"id":"we6fp60WAMVEIbfj44hn","title":"Basics - Get detected!","pathname":"/malware-dev/basics-get-detected","siteSpaceId":"sitesp_23Sqz","description":"Executing shellcode with Defender off.","breadcrumbs":[{"label":"Malware Dev"}]},{"id":"BEmpr7t2pQk7RuNnHqSi","title":"Not so easy to stage!","pathname":"/malware-dev/not-so-easy-to-stage","siteSpaceId":"sitesp_23Sqz","description":"Host shellcode and download on target and execute.","breadcrumbs":[{"label":"Malware Dev"}]},{"id":"jjbx2qjM7up7AaQH2UtR","title":"Base64 Encode Shellcode","pathname":"/malware-dev/base64-encode-shellcode","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Malware Dev"}]},{"id":"4srFMlMOyzz8CyLefc3X","title":"Caesar Cipher (ROT 13) Encrypt Shellcode","pathname":"/malware-dev/caesar-cipher-rot-13-encrypt-shellcode","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Malware Dev"}]},{"id":"txFWEVKL5mqauFbnWHwS","title":"XOR Encrypt Shellcode","pathname":"/malware-dev/xor-encrypt-shellcode","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Malware Dev"}]},{"id":"5lDLgU4Yk2MNu1bdT4kF","title":"AES Encrypt Shellcode","pathname":"/malware-dev/aes-encrypt-shellcode","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Malware Dev"}]},{"id":"VFjU7CkqiTryWSFMwSCM","title":"Handy","pathname":"/handy","siteSpaceId":"sitesp_23Sqz","description":""},{"id":"INTeFaz8cq6YBE9hA1bL","title":"Reverse Shells","pathname":"/handy/reverse-shells","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Handy"}]},{"id":"XVWYyjfFxvWgORHQh8Wx","title":"Pivoting","pathname":"/handy/pivoting","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Handy"}]},{"id":"3mUSjmuf5INGTIgI7zBU","title":"File Transfers","pathname":"/handy/file-transfers","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Handy"}]},{"id":"eZk36u2fApzydNysnoMt","title":"Tmux","pathname":"/handy/tmux","siteSpaceId":"sitesp_23Sqz","description":"","breadcrumbs":[{"label":"Handy"}]},{"id":"WsRJREN1oHbBopD0eFZB","title":"Wifi Pentesting","pathname":"/wifi-pentesting","siteSpaceId":"sitesp_23Sqz","description":""},{"id":"3YB2In1eahG7slREcqpw","title":"Monitoring","pathname":"/wifi-pentesting/monitoring","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Wifi Pentesting"}]},{"id":"QTGqQXHA1TZkoNbu5NqZ","title":"Cracking","pathname":"/wifi-pentesting/cracking","siteSpaceId":"sitesp_23Sqz","breadcrumbs":[{"label":"Wifi Pentesting"}]},{"id":"hhX80KX3ZCxPH0PGZYSF","title":"Buffer Overflows","pathname":"/buffer-overflows","siteSpaceId":"sitesp_23Sqz","description":""},{"id":"xdi4HYqv4bRyZPtuLLQ5","title":"Cloud Security","pathname":"/cloud-security","siteSpaceId":"sitesp_23Sqz","description":""},{"id":"4eZQF12slwhInR1XgnSG","title":"AWS","pathname":"/cloud-security/aws","siteSpaceId":"sitesp_23Sqz","description":"Amazon Web Services","breadcrumbs":[{"label":"Cloud Security"}]},{"id":"LYCtiu1DxqI8N7XThiOa","title":"GCP","pathname":"/cloud-security/gcp","siteSpaceId":"sitesp_23Sqz","description":"This playbook outlines offensive security techniques in Google Cloud Platform (GCP). It is structured around the red teaming lifecycle: reconnaissance, exploitation, privilege escalation, lateral move","breadcrumbs":[{"label":"Cloud Security"}]},{"id":"rLRsRBq9DL86gOMG0xVb","title":"Azure","pathname":"/cloud-security/azure","siteSpaceId":"sitesp_23Sqz","description":"This playbook provides red teaming methodology for Azure environments. It covers:  Azure cloud fundamentals, enumeration and exploitation techniques, real-world CTF-style scenarios, commands and tools","breadcrumbs":[{"label":"Cloud Security"}]},{"id":"473MTNnf68VjvkH19dYJ","title":"Container Security","pathname":"/container-security","siteSpaceId":"sitesp_23Sqz","description":""},{"id":"iNsrM84jAZOSf2OMkNiN","title":"Todo","pathname":"/todo","siteSpaceId":"sitesp_23Sqz","description":""}]}