Channel Avatar

Edward van Biljon @UCIyC8N7k-1l45CnGMvmUxug@youtube.com

943 subscribers - no pronouns :c

Are you managing Microsoft Exchange, PowerShell, or using Wi


05:20
I Cracked a Password-Protected Word Document
03:19
Improved Word Macro that extracts hashes and gets a reverse shell
06:27
I Created a Reverse Shell in Excel
05:12
I Made a Reverse Shell with Microsoft Word Macros
03:55
The Power of LDAPSearch: Unleashing Kali's Hidden Tools
03:05
Validate Credentials with CrackMapExec: Simple and Easy
04:20
Create a reverse shell with a multi handler in metasploit
03:31
PowerShell Reverse Shell: SharpHound bundled with Impacket SMBServer
04:47
RPCClient: The tool you can use for Active Directory enumeration
05:17
Enum4Linux: The Secret Weapon for Your Next Pen Test
05:49
Exploit Suggester: A Hacker's Cheat Sheet
04:55
Evil WinRM: The Hack You Didn't Know About
05:52
I Tested EASSniper PowerShell Tool
02:09
Creating my own reverse shell with python and ex-freeze [Part 3 - Email and bypass Defender]
03:30
Creating my own reverse shell with python and ex freeze [Part 2 - PowerShell working]
02:18
Adding InvisiShell to Your Cybersecurity Toolkit [Educational Purposes Only]
04:13
Reverse Shell using Nim Backdoor and PowerShell [Educational Purposes Only]
02:57
Creating my own reverse shell with python and ex-freeze [Part 1]
04:24
Using a PowerShell Script to get a reverse shell in Windows Server 2022 and a recompiled NetCat
03:23
Using a PowerShell Script to get a reverse shell in Windows Server 2022 and NC64 and dump hashes
02:43
Using a PowerShell Script to get a reverse shell in Windows Server 2022 and NC64 [Bypass Win Def]
03:35
Getting a reverse shell in Windows Server 2022 and adding it to another CVE [CVE-2024-21413 -Part 5]
04:21
Getting a reverse shell in Windows Server 2022 and adding it to another CVE [CVE-2023-23397 -Part 4]
04:01
Using a PowerShell Script to get a reverse shell in Windows Server 2022 and Task Scheduler [Part 3]
06:08
Using a PowerShell Script to get a reverse shell in Windows Server 2022 and the Registry [Part 2]
03:10
Using a PowerShell Script to get a reverse shell in Windows Server 2022 [Part 1]
17:40
Walking through the Exchange Admin Center in Exchange 2019 [Part 4]
01:56
Find where an IP address is coming from with PowerShell [Tested on Windows Server 2022]
03:47
Check and Set Windows Defender Exchange 2019 Exclusions [Tested on Windows Server 2022]
00:59
Removing PowerShell Malware from a Windows System [Tested on multiple Windows Operating Systems]
04:25
Hacking my lab Exchange 2019 by running Impacket's Secrets Dump [Educational Purposes Only]
05:16
Hacking my lab Exchange 2019 with Outlook CVE [CVE-2024-21413 - Educational Purposes Only]
14:29
Walking through the Exchange Admin Center in Exchange 2019 [Part 3]
12:49
Walking through the Exchange Admin Center in Exchange 2019 [Part 2]
21:48
Walking through the Exchange Admin Center in Exchange 2019 [Part 1]
04:30
Running a new Nmap NSE that checks for most Exchange exploits in Zenmap [Educational Purposes Only]
06:26
Using Mimikatz and NetExec in Windows Server 2022 [Educational Purposes Only]
02:41
Manage certificates expiry dates easily with PowerShell [Output to CSV]
02:45
Learn how to use PowerShell to check the installation dates of Windows updates on Servers [Tested]
09:04
Set TLS certificate name on Exchange 2019 Receive Connector [Requires valid SSL Certificate]
03:17
Start the Exchange, IIS, WWW and Filtering services with a single command in exchange 2019 [Tested]
03:48
Update your Kali distribution to the latest [One-liner command]
05:23
Hacking my lab Exchange 2019 by Brute forcing OWA [Educational Purposes only]
04:40
Hacking my lab Exchange 2019 with the ProxyToken Exploit [Educational purpose only]
07:22
Hacking my lab Exchange 2019 with the ProxyShell Exploit [Educational purpose only]
06:25
Hacking my lab Exchange 2019 with the ProxyNotShell Exploit [Educational purpose only]
05:23
Hacking my lab Exchange 2019 with the DLP Exploit [Educational purpose only]
08:21
Hacking my lab Exchange 2019 with the ProxyLogon Exploit [Educational purpose only]
02:27
Pull DNS information of multiple Exchange Servers with PowerShell [PowerShell Scripting]
03:38
Quickly change the default starting location of PowerShell [100% Tested and Working]
02:52
Learn how to find open ports on a machine using PowerShell [Quick and Simple]
02:45
Learn how to use the Exchange 2019 Snapin on PowerShell to manage your Exchange environment [Tested]
06:51
Fix HTTP 500 OWA error in a few simple steps [Exchange 2019]
05:24
Learn how to assess the security of Exchange 2019 by running a vulnerability scan using Zenmap[NMAP]
06:37
Download and run Zenmap on Windows Server 2022[Windows Version]
01:52
Finding your Public IP on Server Core PowerShell [Tested and Working]
02:24
Retrieving binding information from IIS with PowerShell in Exchange 2019[EAC needs bindings]
02:20
Find accounts that passwords are set to never expire in Active Directory[Common mistake]
02:04
Show the WhiteSpace of each Mailbox database in Exchange 2019[Find what is using the space]
03:09
Enable message copy on a Shared Mailbox in Exchange 2019[Not default]