Amr Abdel Hamide
Home
Archive
About
GitHub
Home
Archive
About
GitHub
Profile Image of the Author
Amr Abdel Hamide
Red Teamer | OSCP, CRTP, eWAPTXv3 | breaking systems, simulating real threats.
Categories
Tags
CVEs HTB Pro Labs Linux PrivEsc Web Security Windows PrivEsc
2025
15 posts
04-22
Exploiting Misconfigured ACLs: From Privilege Escalation to Domain Compromise
04-22
Abusing Active Directory Certificate Services (AD CS) for Privilege Escalation
04-22
Abusing Group Policy Objects (GPOs) for Privilege Escalation and Domain Compromise
04-22
Escalate with Generic Write: From File Modification to Full System Compromise
04-22
Exploiting LLMNR Poisoning: From Hash Theft to Domain Compromise
04-22
Exploiting journalctl: From Log Analysis to System Compromise
04-22
Golden Ticket & Scheduled Tasks: Domain Persistence Through Kerberos Exploitation
#Windows PrivEsc
04-22
Impersonation Token Attack: Exploiting SE_IMPERSONATE_PRIVILEGE for Privilege Escalation
#Windows PrivEsc
04-22
Exploiting SQL Server TRUSTWORTHY Property: From Database Access to sysadmin
#Windows PrivEsc
04-22
Weaponizing Splunk Universal Forwarder: From Log Collection to System Compromise
#Linux PrivEsc
04-22
Exploiting Active Sessions Management Vulnerabilities
04-20
Abusing Trusted Domain Controllers: From Privilege Escalation to Domain Domination
04-20
The VSSAdmin Dumping Attack: Extracting Sensitive Data via Shadow Copies
#Windows PrivEsc
04-19
Abusing Sudo Binaries for Privilege Escalation
#Linux PrivEsc
04-19
Abusing Scheduled Tasks: From Privilege Escalation to Full System Compromise
#Linux PrivEsc #Windows PrivEsc
© 2025 Amr Abdel Hamide. All Rights Reserved. / RSS / Sitemap
© 2025 Amr Abdel Hamide. All Rights Reserved. / RSS / Sitemap