Hello people ¯\_()_/¯ This is the part 3 in our journey

Lets start the enumeration part of Poweshell.

P.S> Get-LocalUser

This command will grab all the users on the machine.

P.S> Get-LocalUser | Get-Member

Listing all the property we can try with Get-LocalUser cmdlet.

We will try to understand Installation and post exploitation using Bloodhound.

Bloodhound is an application used to visualize Active directory environments. Before the release of bloodhound the process was performed by penetration testers that were looking to exploit trust-based relationships within an active directory domain.

Since the release of bloodhound…

In this post we will understand How to use Mimikatz for post exploitation.

In French Mimikatz stands for cute cats but this tool is definitely a hell cat. This is a Post exploitation tool intended to help attckers Blackhat, red-blue teamers or penetration testers to extract Login Ids, passwords and…

We will try to understand some basics of Active Directory.

According to Microsoft Corporate Vice President Takeshi Numoto, Active Directory is used by 93% of the Fortune 1000.

Note: Do your own research as well for better understanding.

What is Active Directory?

In simple Words Active Directory is a directory service for Windows domain…

Hello Young Fellas I am back with Powershell Journey. So Let’s Get started.

Word of Suggestion:

Refer Part 1 The beginning For better understanding if you haven’t check it out.

Also, Every command is in its simplest form for a better understanding please always check the Get-Help command for better use cases.


Recently I started learning PowerShell Because If you try to hack services on windows environment in an efficient way the more powershell you know the better you and it is really great to automate tasks as well.

Why POwerShell?

Powershell is everywhere it can be used to automate task, manipulate files, registries…

Firstly you might think what the hack is THC so My friend it stands for The Hacker’s choice. And it is really a GEM.

This is my first write-up so please forgive my mistakes.

THC-Hydra is a Brute-force Cracking tool which supports many a protocols like HTTP, HTTPS, SSH, Telnet, LDAP, FTP And many more.

Disclaimer AND Credits To the Developer-

Hydra v9.1 © 2020 by van Hauser/THC & David Maciejak — Please do not use in…


I am a student, Bug Bounty Hunter, CTF player and a geek for sure. Who is currently sharpening the axe.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store