🦦
Otter's Notes
Ctrlk
  • Introduction
  • Articles
    • Dumping data from the Microsoft Recall folder
    • Gaining persistence on Windows with Time Providers
    • Reverse engineering LSASS to decrypt DPAPI keys
    • Intro to Hypervisor Implants
    • In-depth Windows Telemetry
  • Notes
    • Active Directory
    • AAD
    • Forest Trust Abuse
    • Kerberos
    • DACL Abuse
    • ADCS
    • PowerShell
    • AWS
    • Binary Exploitation
      • Environment setup for Browser Exploitation
      • Browser Overview and Components
    • Kernel Development
Powered by GitBook
On this page
  1. Notes

Binary Exploitation

Environment setup for Browser ExploitationBrowser Overview and Components
PreviousAWS PrincipalsNextEnvironment setup for Browser Exploitation