blueninjaDetecting Evil AgentsEvery malware will try establish network connection after it was executed on target host. This is done for different purposes like sending…Jul 8, 2022Jul 8, 2022
blueninjaHunting non-ASCII printable JSON keysRecently I’ve stumbled across the article on the analysis of authentication bypass vulnerability in the User Portal and Webadmin in Sophos…Apr 22, 2022Apr 22, 2022