Steve BoroshAzure App Services For Offensive OperationsIn this blog, I will be covering how to use Azure App Services for offensive purposes.5 min read·May 14, 2020----
Steve BoroshUsing the InterPlanetary File System For Offensive OperationsIntroduction5 min read·Jan 2, 2020--1--1
Steve BoroshDigital Canaries in Coal Mines: Detecting Adversarial Enumeration with DNS and ADIntroduction11 min read·Sep 26, 2019----
Steve BoroshGetting Started With AzureDevOpsA getting-started guid to building C# tools with Azure DevOps.5 min read·Sep 18, 2019----
Steve BoroshIntroductionSteve Borosh is a Principal Security Consultant for Trustwave and Trustwave Government Solutions, specializing in offensive security…5 min read·Jun 24, 2019----
Steve BoroshinPosts By SpecterOps Team MembersPhishing tales: Microsoft Access Macro (.MAM) shortcutsPreviously, I blogged about the ability to create malicious .ACCDE Microsoft Access Database files and using them as a phishing vector…6 min read·Jul 3, 2018--1--1
Steve BoroshinPosts By SpecterOps Team MembersShelling Apache Felix With Java BundlesAdministrative portals remain one of the top “low hanging fruit” categories to be on the lookout for when performing bug bounties…5 min read·Jun 20, 2018----