🦦
Otter's Notes
search
⌘Ctrlk
🦦
Otter's Notes
  • otterIntroduction
  • Articles
    • bombDumping data from the Microsoft Recall folder
    • bombGaining persistence on Windows with Time Providers
    • magnifying-glassReverse engineering LSASS to decrypt DPAPI keys
    • magnifying-glassIntro to Hypervisor Implants
    • magnifying-glassIn-depth Windows Telemetry
    • bombWindows of Opportunity: exploiting race conditions in Seclogon to dump LSASS
  • Notes
    • Active Directory
    • AAD
    • Forest Trust Abuse
    • Kerberos
    • DACL Abuse
    • ADCS
    • PowerShell
    • AWS
    • Binary Exploitation
      • Environment setup for Browser Exploitation
      • Browser Overview and Components
    • Kernel Development
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Notes

Binary Exploitation

Environment setup for Browser Exploitationchevron-rightBrowser Overview and Componentschevron-right
PreviousAWS Principalschevron-leftNextEnvironment setup for Browser Exploitationchevron-right