Group
  • Home
  • Posts
  • Support
  • LinkedIn
  • Q&A

OffSec

Offensive Security Tag, for exploitation, tools, tips and philosophy
Hollow Pentesting

Hollow Pentesting

Confidently using AI in your Pentests. Hollow Testing.

Read more
Synology DSM 7.3.2

Synology DSM 7.3.2

Chaining three issues to gain root from a low privileged user.

Read more
Thanks GPT-4

File Folding.

File Folding is a technique that moves a file into hex, and that hex is broken into folder file names in a fashion that can be reconstructed.

Read more
Data-bouncing

Data-bouncing

Data-Bouncing - The art of indirect exfiltration. Using & Abusing Trusted Domains as a 2nd Order Transport.

Read more
The Lottery

Three-Word Password Attacks

The idea behind three word passwords as a concept is in my opinion a nice nudge in the right direction, In a perfect world, a passphase or a sentence

Read more
Publicker.

Publicker.

Cross-referencing acquired credentials against public known, known bad credentials in a bid to really hit home the cultural change required. or just fully breaking down a target.

Read more
Group

Emergency Cyber Security Support

The Contractor 🏴‍☠️🧯 © 2026

Connect

Twitter
@thecontractorio
Bluesky
@thecontractorio
Threads
@yosignals
LinkedIn
JC

Pages

  • Support
  • Posts
  • Q&A

Topics

  • OSINT
  • Defence
  • Appsec
  • Entsec
  • Infosec
  • Offsec
  • Exploitation
  • Privacy
  • Random
  • Ideas
  • Archive