Tags ad2 c1 certifications6 csharp2 ctf6 dcom1 dinvoke1 embedding1 evasion5 exploitation1 lateral-movement2 ldap1 module-stomping1 obfuscation2 offsec6 pentesting2 powershell3 process-injection1 red-teaming2 retrieval1 scanner1 shellcode1 stack-spoofing2 syswhispers1 web7 welcome1