From b181768b8459163761f1c27d3d7eee5f58d5c4d0 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Sun, 11 Mar 2018 01:02:31 +0700 Subject: [PATCH] Update README.md - Add Post Exploitation section - Add Windows Post Exploitation on Post Exploitation section - Add "Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)" --- README.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/README.md b/README.md index 6d0d5b5..4443919 100644 --- a/README.md +++ b/README.md @@ -11,6 +11,7 @@ My curated list of awesome links, resources and tools - [Digital Forensics and Incident Response](#digital-forensics-and-incident-response) - [Exploitation](#exploitation) - [Malware Analysis](#malware-analysis) + - [Post Exploitation](#post-exploitation) - [Reverse Engineering](#reverse-engineering) - [Tutorials](#tutorials) - [Web Application Security](#web-application-security) @@ -386,6 +387,12 @@ My curated list of awesome links, resources and tools - [Reverse engineering malware: TrickBot (part 2 - loader)](https://qmemcpy.github.io/post/reverse-engineering-malware-trickbot-part-2-loader) - [Reverse engineering malware: TrickBot (part 3 - core)](https://qmemcpy.io/post/reverse-engineering-malware-trickbot-part-3-core) +### Post Exploitation + +#### Windows Post Exploitation + +- [Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)](https://medium.com/@adam.toscher/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa) + ### Reverse Engineering - [A Gentle Primer on Reverse Engineering](https://emily.st/2015/01/27/reverse-engineering/)