Esec forte technologies - red team specialist - cloud platform
MumbaieSec Forte Technologies
...ADCS abuse, ACL abuse, Kerberoasting, constrained delegation attacks.- EDR Evasion & Detection Bypass : Memory injection, indirect syscalls, callback-based execution, sandbox/EDR bypass.- CI/CD & DevOps Abuse : GitHub/Azure DevOps misconfigurations, credential leakage, pipeline compromise, supply-chain style attacks.- Cloud Red [...]