Home
Posts
Projects
Contact Us
Donate ❤️
About 0xsp
offensive
Red ops techniques
Hunting Windows Credentials (CredUIPromptForWindowsCredentials)
unique attacks with 0xsp mongoose red
bypass restricted command prompt for none-privileged users
handy techniques to bypass environment restrictions
DLL Self Contained in PowerShell
Microsoft File CheckSum DLL hijacking Attack
DirectX Software Development Kit(SDK) RCE Exploitation
Gophish on Digital Ocean with Blacklist Range
.NET Exploitation MITRE T1121
Reverse Shell with password protection
Bypass Symantec Email Security.cloud
red team cheatsheet
bypass endpoint with XLM weaponization
Web attacks payloads collections
Privilege Escalation cheatsheet
offensive cheatsheet
Active Directory (Attack & Defense )
Windows Blind Files Collection
Red Teaming Toolkit Collection
security dev
0xsp-mongoose RED
0xsp mongoose windows privilege escalation enumeration
Exploits-DB Online web terminal tool
Threat intelligence IPs Checker Tool
security research & development (SRD)
Malware Research
Porting Backdoors - Windows rootkits via RESTful API Service
Elevation of privilege (EoP) with Token stealing Overview
Footprints of Mailgun Phishing Campaigns
0xsp | Contact Us
Name
Email
Notes