PowerView.py
Immaginiamo la struttura Active Directory (AD) come una città: utenti, gruppi e computer sono i cittadini e gli edifici; le GPO sono le regole del traffico; i trust sono i ponti verso altre città. Molte organizzazioni implementano misure di sicurezza (spendendo anche cifre importanti) senza avere una visione ...🕋
Username Anarchy
2024-10-31T11:52:54+00:00By quester PS10n|Categories: ⚔️, Defense, Hacking, Tool|
Sicurezza del Software con gli ELF x86/64
2024-08-26T15:07:13+00:00By quester Rs4rela|Categories: ⚔️, Hacking|
Tienimi aggiornato sulla
prossima “quest” 📩
ve ou
APT-Hunter
2024-01-19T11:36:49+00:00By quester PS10n|Categories: ⚔️, Tool|Tags: Forensic, Incident Response|
Forensicator
2024-01-19T11:36:49+00:00By quester Rs4rela|Categories: ⚔️, Hacking, Tool|Tags: Forensic, Incident Response|
CTF Necromancer – Parte I
2025-04-13T10:11:17+00:00By quester Rs4rela|Categories: ♜, ⚔️, CTF, Hacking, Necro, 🗡️|
CTF Necromancer – Parte II
2025-04-13T10:11:08+00:00By quester Rs4rela|Categories: ♜, ⚔️, CTF, Hacking, Necro, 🗡️|
CTF Necromancer – Parte III
2025-04-13T10:10:49+00:00By quester Rs4rela|Categories: ♜, ⚔️, CTF, Hacking, Necro, 🗡️|
Yara-Scanner_MOD
2024-01-19T11:36:49+00:00By quester Rs4rela|Categories: ⚔️, Hacking, Tool|Tags: Forensic, Incident Response|
Azure Annihilation
2025-03-29T23:49:22+00:00By quester Rs4rela|Categories: ⚔️, Attack, Hacking, Vulnerability|
CyLR
2024-01-19T11:36:49+00:00By quester Rs4rela|Categories: ⚔️, Tool|Tags: Forensic, Incident Response, Penetration Test|
TruffleHog
2024-01-19T11:36:49+00:00By quester PS10n|Categories: ⚔️, Tool|Tags: Forensic, Penetration Test|
Creare un Malware
2024-01-19T11:36:25+00:00By quester Rs4rela|Categories: ⚔️, Hacking|
Lupo – Malware IOC Extractor
2024-01-19T11:36:25+00:00By quester PS10n|Categories: ⚔️, Tool|Tags: Incident Response|






























