Axis Shift: Pivoting using ZeroTier Pivoting is a specific process in post-exploitation in which an attacker expands his presence in the network. This article is about pivoting using ZeroTier.
Witchhammer VIP: NAT bypass for pivoting on Windows NAT can cause problems for a pentester when pivoting, especially if we are talking about compromised Windows machines. In this article, I will continue to demonstrate the concept of L2 tunneling against compromised Windows machines, but with NAT in mind
Witchhammer: Windows post-exploitation using virtual VPN channels Pivoting against Windows is a fairly complex post-exploitation process. In this article I will demonstrate my new method of link layer pivoting using SoftEther and without a virtual machine
Windows Nightmare: Extreme Pivoting against Windows This is a research about a specific vector of Windows post-exploitation using OpenWRT