Shuciran Pentesting Notes
Knowledge Base for Penetration Testing
HOME
CATEGORIES
TAGS
ARCHIVES
ABOUT
Sensitive Data
Sensitive Data
Tag
Sensitive Data
1
Extracting Sensitive Information through an LLM
26/11/2025
VBA Office Macro
Certutil.exe
Reverse Shells
Prompt Injection Step by Step
Using Ollama Modelfiles
AI
exploitation
wireless
file transfer
hackthebox
active directory
scr
windows privesc
mobile
linux enumeration
AI
exploitation
wireless
file transfer
hackthebox
active directory
scr
windows privesc
mobile
linux enumeration