{"version":1,"pages":[{"id":"-MDtkaSZGNj3_doj5CN9","title":"About Shantanu Khandelwal","pathname":"/","siteSpaceId":"sitesp_wY2Fd","description":"Know me"},{"id":"-MEFyGaTGamKxeeBJv5P","title":"Excel Sheet to Word Report by PowerShell","pathname":"/reporting/excel-sheet-to-word-report-by-powershell","siteSpaceId":"sitesp_wY2Fd","description":"Report writing from Excel Sheet to Word using PowerShell","breadcrumbs":[{"label":"Reporting"}]},{"id":"-MRxWx13zcjRNlm8IDs-","title":"Ghostwriter - Add report type","pathname":"/reporting/ghostwriter-add-report-type","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Reporting"}]},{"id":"-Mjm6sXwOWgna2uCuMCG","title":"HTTPS C2 Done Right NGINX","pathname":"/red-team/https-c2-done-right-nginx","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"}]},{"id":"-MSc8AHOY1XpLh1t70p7","title":"Domain Front","pathname":"/red-team/domain-front","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"}]},{"id":"-MSc8MQ4ZN22X-HKzSRX","title":"Firebase Domain Front - Hiding C2 as App traffic","pathname":"/red-team/domain-front/firebase-domain-front-hiding-c2-as-app-traffic","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"},{"label":"Domain Front"}]},{"id":"-MEMvlzpO9-s0_dKr2Zy","title":"GoLang","pathname":"/red-team/golang","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"}]},{"id":"-MEMxG8D_301-fBX06xf","title":"Red Team: How to embed Golang tools in C#","pathname":"/red-team/golang/red-team-how-to-embed-golang-tools-in-c","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"},{"label":"GoLang"}]},{"id":"-MEMvWm5jj3Ck7aXdt8u","title":"Red Team: Using SharpChisel to exfil internal network","pathname":"/red-team/golang/red-team-using-sharpchisel-to-exfil-internal-network","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"},{"label":"GoLang"}]},{"id":"-MEWqdLm5htQzeK4A8Cz","title":"Converting your GO bins to Shellcode and Using them in C#","pathname":"/red-team/golang/converting-your-go-bins-to-shellcode-and-using-them-in-c","siteSpaceId":"sitesp_wY2Fd","description":"How to convert binaries compiled in golang to shellcode","breadcrumbs":[{"label":"Red Team"},{"label":"GoLang"}]},{"id":"-MQaQh8QfCQXZoPzZKua","title":"ShellCode Injection","pathname":"/red-team/shellcode-injection","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"}]},{"id":"-MhSLetbT9IhV3lGWKIj","title":"magic_mz_x86 and magic_mz_x64","pathname":"/red-team/shellcode-injection/magic_mz_x86-and-magic_mz_x64","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"},{"label":"ShellCode Injection"}]},{"id":"-MQaQmUV04vkHWGpRPQQ","title":"Process Hollowing DInvoke","pathname":"/red-team/shellcode-injection/process-hollowing-dinvoke","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"},{"label":"ShellCode Injection"}]},{"id":"NEjyMfIotmW0A5CDTiH0","title":"Shellcode Formatter","pathname":"/red-team/shellcode-injection/shellcode-formatter","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"},{"label":"ShellCode Injection"}]},{"id":"LGLUvkxY57io8yDOZlmP","title":"DLL Sideloading","pathname":"/red-team/shellcode-injection/dll-sideloading","siteSpaceId":"sitesp_wY2Fd","description":"Not the perfect way, but the faster way","breadcrumbs":[{"label":"Red Team"},{"label":"ShellCode Injection"}]},{"id":"B2LFySgpEatw41WK51dn","title":"InMemory Shellcode Encryption and Decryption using SystemFunction033","pathname":"/red-team/shellcode-injection/inmemory-shellcode-encryption-and-decryption-using-systemfunction033","siteSpaceId":"sitesp_wY2Fd","description":"Shellcode encoding using SystemFunction033","breadcrumbs":[{"label":"Red Team"},{"label":"ShellCode Injection"}]},{"id":"-MPTS_BAbL8yuxMJGes2","title":"PowerShell","pathname":"/red-team/powershell","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"}]},{"id":"-MU9Gh1XPAMDetZH01Bl","title":"Enable Restricted Admin using powershell and use mimikatz for RDP","pathname":"/red-team/powershell/enable-restricted-admin-using-powershell-and-use-mimikatz-for-rdp","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"},{"label":"PowerShell"}]},{"id":"-MRxahiUv80620fkthg_","title":"Powershell Custom Runspace","pathname":"/red-team/powershell/powershell-custom-runspace","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"},{"label":"PowerShell"}]},{"id":"-MPTSrEqGGjZ2I1TVuwa","title":"Using Reflection for AMSI Bypass","pathname":"/red-team/powershell/using-reflection-for-amsi-bypass","siteSpaceId":"sitesp_wY2Fd","description":"Converting an already available AMSI Bypass to FULL in memory AMSI Bypass","breadcrumbs":[{"label":"Red Team"},{"label":"PowerShell"}]},{"id":"-MTC4fMeZKsOw4EqoQK9","title":"Database","pathname":"/red-team/database","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"}]},{"id":"-MTKBFsRrSb-gs7D-r0c","title":"Extract MSSQL Link Password","pathname":"/red-team/database/extract-mssql-link-password","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"},{"label":"Database"}]},{"id":"-MTC4nrIXRwL3kso00Al","title":"MSSQL Link Crawl - OpenQuery Quotes Calculator","pathname":"/red-team/database/mssql-link-crawl-openquery-quotes-calulator","siteSpaceId":"sitesp_wY2Fd","description":"MSSQL Link Crawls","breadcrumbs":[{"label":"Red Team"},{"label":"Database"}]},{"id":"ZoqbY8CROt6oUosuSP1U","title":"DLL Sideloading","pathname":"/red-team/dll-sideloading","siteSpaceId":"sitesp_wY2Fd","description":"","breadcrumbs":[{"label":"Red Team"}]},{"id":"Psf4XFVSDnF3eLvMbRCC","title":"DLL Koppeling","pathname":"/red-team/dll-sideloading/dll-koppeling","siteSpaceId":"sitesp_wY2Fd","description":"Short guide on How to use the Koppeling project","breadcrumbs":[{"label":"Red Team"},{"label":"DLL Sideloading"}]},{"id":"23ud3QhrfuMmkxQu8sSR","title":"DLL Sideloading not by DLLMain","pathname":"/red-team/dll-sideloading/dll-sideloading-not-by-dllmain","siteSpaceId":"sitesp_wY2Fd","description":"Never run your payloads from the DLLMain","breadcrumbs":[{"label":"Red Team"},{"label":"DLL Sideloading"}]},{"id":"0xvjjuBvOe3DXxp0qq0h","title":"Walking with Docker","pathname":"/red-team/walking-with-docker","siteSpaceId":"sitesp_wY2Fd","breadcrumbs":[{"label":"Red Team"}]},{"id":"ogDKu9YNJLNVdzXqvT8U","title":"Self-Hosting Havoc C2 / or any other C2  in Docker","pathname":"/red-team/walking-with-docker/self-hosting-havoc-c2-or-any-other-c2-in-docker","siteSpaceId":"sitesp_wY2Fd","description":"Running Havoc C2 server and client in Docker","breadcrumbs":[{"label":"Red Team"},{"label":"Walking with Docker"}]},{"id":"mYqfreMBbz97UtEOMTbU","title":"Breach Attack Simulation - Starting With OpenBAS","pathname":"/red-team/breach-attack-simulation-starting-with-openbas","siteSpaceId":"sitesp_wY2Fd","description":"Caldera has been in market for years, I have never tried it. I saw OpenBAS on my recommended lists in Github so I thought I might give it a try","breadcrumbs":[{"label":"Red Team"}]},{"id":"cDrfeUh2Tne0VFU1TTrt","title":"Update - OpenBAS to OPENAEV. Performing Adversary Emulation","pathname":"/red-team/update-openbas-to-openaev.-performing-adversary-emulation","siteSpaceId":"sitesp_wY2Fd","description":"OpenBAS changed its branding to OPENAEV. How to set it up and start working","breadcrumbs":[{"label":"Red Team"}]},{"id":"-MFOpbfDGQkusEdA0P9C","title":"Setting Up OPENVAS in KALI 2020.3","pathname":"/dealing-with-the-errors/setting-up-openvas-in-kali-2020.3","siteSpaceId":"sitesp_wY2Fd","description":"Dealing with openvas installation error in KALI 2020.3","breadcrumbs":[{"label":"Dealing with the Errors"}]},{"id":"xhpCoSa2RPZZwgVImHi0","title":"Page","pathname":"/dealing-with-the-errors/page","siteSpaceId":"sitesp_wY2Fd","breadcrumbs":[{"label":"Dealing with the Errors"}]},{"id":"QrbxspFYZO1Sw4qrWSrA","title":"Page 1","pathname":"/dealing-with-the-errors/page/page-1","siteSpaceId":"sitesp_wY2Fd","breadcrumbs":[{"label":"Dealing with the Errors"},{"label":"Page"}]},{"id":"-MNxXxmugF3Pf8zTRHc4","title":"Connecting GoPhish with Office365","pathname":"/phishing/connecting-gophish-with-office365","siteSpaceId":"sitesp_wY2Fd","description":"Operational challenges of setting of Office365 SMTP with GoPhish","breadcrumbs":[{"label":"Phishing"}]},{"id":"-MOgGrqL66SFx0-jd9qH","title":"SharpLoginPrompt - Success and a Curious Case","pathname":"/phishing/sharploginprompt-success-and-a-curious-case","siteSpaceId":"sitesp_wY2Fd","description":"A tale of why SharpLoginPrompt Always Works and a recent curious case","breadcrumbs":[{"label":"Phishing"}]},{"id":"-MlNR_eCO4ksPUSN2Spz","title":"Gophish MODs","pathname":"/phishing/gophish-mods","siteSpaceId":"sitesp_wY2Fd","description":"Modify Gophish to Bypass Detection","breadcrumbs":[{"label":"Phishing"}]},{"id":"XxAochuvE8uF9HfC6O0e","title":"Long Live DMARC - Email Spoof issues","pathname":"/phishing/long-live-dmarc-email-spoof-issues","siteSpaceId":"sitesp_wY2Fd","description":"Spoof emails when SPF is present but DMARC is not allowing you to spoof the sender","breadcrumbs":[{"label":"Phishing"}]},{"id":"FpXHK0thjGyWsNzDdOVt","title":"Error Solves (Random)","pathname":"/phishing/error-solves-random","siteSpaceId":"sitesp_wY2Fd","breadcrumbs":[{"label":"Phishing"}]},{"id":"7u9vhrrjXsfk20C4Xu93","title":"Rust OPENSSL install issues","pathname":"/phishing/error-solves-random/rust-openssl-install-issues","siteSpaceId":"sitesp_wY2Fd","breadcrumbs":[{"label":"Phishing"},{"label":"Error Solves (Random)"}]},{"id":"QZcZ5MJkXcPvRnd0hh9F","title":"Mobile Application Testing","pathname":"/mobile-application-testing","siteSpaceId":"sitesp_wY2Fd"},{"id":"y7pBn9xk2Ec0siO0754d","title":"How to Download APK from Huawei App Store","pathname":"/mobile-application-testing/how-to-download-apk-from-huawei-app-store","siteSpaceId":"sitesp_wY2Fd","description":"Downloading APK from Huawei App store (Google Play Store APK)","breadcrumbs":[{"label":"Mobile Application Testing"}]},{"id":"-MeSPm-_Cv61nO9lwIbd","title":"Talks Worth Checking Out","pathname":"/talks-worth-checking-out","siteSpaceId":"sitesp_wY2Fd","description":"Important Talks"},{"id":"PIIWQ5X0JB2i8Vqkz961","title":"Parsing Certificate Transparency Logs","pathname":"/web-application-penetration-testing/parsing-certificate-transparency-logs","siteSpaceId":"sitesp_wY2Fd","breadcrumbs":[{"label":"Web Application Penetration Testing"}]}]}