@Cybersecomar

I have been looking for great content in such areas, and I found out much greater content than I expected. Keep up the good work.

@gjsatru3383

Alexis you are rocking your content

@darphaprothon20

hey man im new in this world ,  nice work please keet it going never stop <3 thx for all ur vids ..

@viruldojitha9341

Man this serious is awesome...

@Yoyo-qn4mv

you are amazing, and tnq for sharing your knowlage , absolutle better then what I learn in collage XD

@poonambisht2697

Keep going man ... Content is 🔥

@KA-NV

Very well explained and informative. In the john the ripper part, there are some hashes that are not valid, so l would delete them before trying the cracking.

@bazcon6891

Its very informative content. Thanks a lot brother

@TarmacHolopaw

Love your content. Thanks!

@Derek6765

Great content!

@mrniko1340

nice work bro

@Saint_sheedy

Valuable

@kadourkadouri3505

I think from win 10, they kinda start to encourage people to use their MSFT or Hotmail credentials in order to login into their machines.

@korovamilkplus

As usual, I tested in my lab with the latest updated version of Windows 10.
First, it's necessary to make sure to migrate to a 64-bit process with administrator privileges.
Initially, I migrated to explorer.exe and nothing worked, then after switching to lsass.exe things changed.

In conclusion, I can say that today:
Mimikatz, Meterpreter's HashDump command, the Kiwi module, and the credential_collector module work perfectly.
The Unattend.xml file is not in the Panther folder.
WCE does not work with any parameters.
The real problem is creating a payload with MSFvenom that is not detected by Windows Defender to start the attack.
Both Shikata Ga Nai and Shellter are immediately detected.

Regarding Starkiller, it's easy to evade Windows Defender with Invoke-Obfuscation.
The problem is that Windows Defender block the powershell/privesc/bypassuac module.

In any case, thank you so much Alexis for this latest fantastic (free) lesson!
Your work is invaluable!

@talib_Bijnori

sir, I'm not able to install metasploitble 2 on my kali Linux , I've been trying for 3 days, I know there is a tutorial on your channel that how to install metasploitble 2, but that was on windows OS, please make a video on installing ms2 on kali Linux, I've stuck on your series (web app penetration testing). Please solve it for me, thank you ❤️

@prasantakumar1666

Make a video on payload crypters to bypass av detection of Android and windows.

@morph2584

My soul is mengheker

@sprBEAST211

Hasn't mimikatz been replaced by or integrated into kiwi?

@mattcargile

Now do it on win server 2019

@armanagrawal4170

Need Part 1 registration link