Bipolar Disorder: Pivoting with TailScale Pivoting is used in a post-exploitation context and has many techniques. In this article I will also demonstrate the ability to move around the network using TailScale.
Against: Pentesting MikroTik Routers The use of MikroTik routers is widespread around the world and their security is an issue. This is a release of my article on attacks on MikroTik routers.
Violence: Pivoting using Nebula Pivoting is used in post-exploitation and has many methods, this article will talk about pivoting using Nebula
Axis Shift: Pivoting using ZeroTier Pivoting is a specific process in post-exploitation in which an attacker expands his presence in the network. This article is about pivoting using ZeroTier.
Witchhammer VIP: NAT bypass for pivoting on Windows NAT can cause problems for a pentester when pivoting, especially if we are talking about compromised Windows machines. In this article, I will continue to demonstrate the concept of L2 tunneling against compromised Windows machines, but with NAT in mind
Witchhammer: Windows post-exploitation using virtual VPN channels Pivoting against Windows is a fairly complex post-exploitation process. In this article I will demonstrate my new method of link layer pivoting using SoftEther and without a virtual machine
Windows Nightmare: Extreme Pivoting against Windows This is a research about a specific vector of Windows post-exploitation using OpenWRT