• Home
  • Posts
  • Projects
  • Contact Us
  • Donate ❤️‍

  • About 0xsp
  • offensive
  • Red ops techniques
    • Hunting Windows Credentials (CredUIPromptForWindowsCredentials)
    • unique attacks with 0xsp mongoose red
    • bypass restricted command prompt for none-privileged users
    • handy techniques to bypass environment restrictions
    • DLL Self Contained in PowerShell
    • Microsoft File CheckSum DLL hijacking Attack
    • DirectX Software Development Kit(SDK) RCE Exploitation
    • Gophish on Digital Ocean with Blacklist Range
    • .NET Exploitation MITRE T1121
    • Reverse Shell with password protection
    • Bypass Symantec Email Security.cloud
    • red team cheatsheet
    • bypass endpoint with XLM weaponization
  • Web attacks payloads collections
  • Privilege Escalation cheatsheet
  • offensive cheatsheet
  • Active Directory (Attack & Defense )
  • Windows Blind Files Collection
  • Red Teaming Toolkit Collection
  • security dev
  • 0xsp-mongoose RED
  • 0xsp mongoose windows privilege escalation enumeration
  • Exploits-DB Online web terminal tool
  • Threat intelligence IPs Checker Tool
  • security research & development (SRD)
  • Malware Research
    • Porting Backdoors - Windows rootkits via RESTful API Service
  • Elevation of privilege (EoP) with Token stealing Overview
  • Footprints of Mailgun Phishing Campaigns
0xsp | Contact Us