Sec-88
Search...
Ctrl
K
Desktop AppSec
Previous
Basic AD Pentesting
Next
Thin Client vs. Thick Client
Last updated
16 hours ago
Was this helpful?
π»
Desktop Application Penetration Testing (1)
How did I gain RCE and dump the database from the exploit desktop application?
DisLaugh | 0xL4ugh CTF 2024
Beyond the Desktop: Exploiting a Leaked Token for API | Strik3r Blog
SecVulture
GitHub - DEMON1A/Brocmon: Modified version of Process monitor that bypasses procmon detection for anti-debuggers
GitHub