Russell WellsHell In A Shell | Hijack Execution Flow: COR_PROFILERThis is a juicy one, if you want to persist in an environment after gaining initial access then this might just be for you.Oct 11, 2022Oct 11, 2022
Russell WellsHell In A Shell | Application ShimmingIn this series I’ll be sharing some of my favourite tips and tricks for red team and penetration testing engagements.Oct 4, 2022Oct 4, 2022
Russell WellsExploiting CVE-2019–3652 | Owning a networked software repository to PWN endpoints.Exploiting CVE-2019–3652 | Owning a networked software repository to PWN endpointsAug 21, 2020Aug 21, 2020
Russell WellsData Exfiltration | Bypassing a misconfigured DLP to exfiltrate sensitive data.Data Exfiltration | Bypassing a misconfigured DLP to exfiltrate sensitive data.Aug 11, 2020Aug 11, 2020
Russell WellsUse an Office macro to download and execute a payload Red Team tips.Sometimes getting the initial shell into an environment can be tricky. For myself and others the go to is a good old phishing mail. But…May 15, 2020May 15, 2020