
RCE on Windows from Linux Part 6: RedSnarf. RCE on Windows from Linux Part 5: Metasploit Framework. RCE on Windows from Linux Part 4: Keimpx. RCE on Windows from Linux Part 3: Pass-The-Hash Toolkit.
RCE on Windows from Linux Part 2: CrackMapExec. RCE on Windows from Linux Part 1: Impacket. Accessing Windows Systems Remotely From Linux Menu Toggle. 19 Ways to Bypass Software Restrictions and Spawn a Shell. Top 16 Active Directory Vulnerabilities. Top 10 Vulnerabilities: Internal Infrastructure Pentest. Install Nessus and Plugins Offline (with pictures).
Detailed Overview of Nessus Professional. CMS Vulnerability Scanners for WordPress, Joomla, Drupal, Moodle, Typo3. Top 20 Microsoft Azure Vulnerabilities and Misconfigurations.