Cybersec Notes
Search
Search
Search
Explorer
Active Directory
ACLs
ForceChangePassword
WriteDACL
ADCS
Certifried
ESC1
ESC4
Shadow Credentials
Delegation
Resource Based Constrained Delegation
ASREPRoasting
DCSync
Kerberoasting
Kerberos Clock Skew Error
Machine Account Quota
WSUS
AI & ML
Common Applications
Gitea Pipeline Exploitation
Linux
Misc
PowerShell Credentials
Pre-Created Machine Accounts
Tools
Payload Obfuscation
KeyTabExtract
Perfusion
Username Anarchy
Webapps
Reverse Tabnabbing
Windows
Privilege Escalation
DNSAdmins
SeBackupPrivilege
SeLoadDriverPrivilege
Server Operators
Persistence
Wireless
Monitor Mode
Wireshark Cheat Sheet
Home
❯
Common Applications
Common Applications
Notes on dealing with common applications such as Jenkins/Gitea/CyberArk.
1 item under this folder.
Dec 14, 2025
Gitea Pipeline Exploitation
Play
CICD-Pipeline
Gitea
Git-Pipeline
Git