Übermensch: Bypassing NAT when pivoting on Windows with Nebula This article explores advanced NAT pivoting techniques on Windows using Nebula, leveraging Hole Punching and ICS to access internal network
Philosophy of Nietzsche: Pivoting on Windows using Nebula In this article, I will demonstrate an exotic method I found for pivoting on Windows by building an overlay Nebula network
Bipolar Disorder: Pivoting with TailScale Pivoting is used in a post-exploitation context and has many techniques. In this article I will also demonstrate the ability to move around the network using TailScale.
Against: Pentesting MikroTik Routers The use of MikroTik routers is widespread around the world and their security is an issue. This is a release of my article on attacks on MikroTik routers.
Violence: Pivoting using Nebula Pivoting is used in post-exploitation and has many methods, this article will talk about pivoting using Nebula
Axis Shift: Pivoting using ZeroTier Pivoting is a specific process in post-exploitation in which an attacker expands his presence in the network. This article is about pivoting using ZeroTier.
Witchhammer VIP: NAT bypass for pivoting on Windows NAT can cause problems for a pentester when pivoting, especially if we are talking about compromised Windows machines. In this article, I will continue to demonstrate the concept of L2 tunneling against compromised Windows machines, but with NAT in mind
Witchhammer: Windows post-exploitation using virtual VPN channels Pivoting against Windows is a fairly complex post-exploitation process. In this article I will demonstrate my new method of link layer pivoting using SoftEther and without a virtual machine
Windows Nightmare: Extreme Pivoting against Windows This is a research about a specific vector of Windows post-exploitation using OpenWRT