Abdel AhmedinOSINT TeamRed Teaming 101: Privilege Escalation on Windows Using LNK Files (Part 3)In the two previous parts of the Red Teaming 101 series, we showed how to create a malicious LNK file (shortcut) and how to bypass Mark of…1d ago
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 112
VEEXHinThe Sleuth SheetMy Short Term Learning Goals: Becoming Better at IntelligenceIntelligence is a tradecraft that requires a lifetime of dedication and sacrifice to reach the top of the pyramid.2d ago2d ago
Jean-Pierre LESUEUR (Microsoft MVP)inPhrozenUnderstanding Malware Patching: ResourcesAbstractMay 17May 17
Abdel AhmedinOSINT TeamRed Teaming 101: Privilege Escalation on Windows Using LNK Files (Part 3)In the two previous parts of the Red Teaming 101 series, we showed how to create a malicious LNK file (shortcut) and how to bypass Mark of…1d ago
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 112
VEEXHinThe Sleuth SheetMy Short Term Learning Goals: Becoming Better at IntelligenceIntelligence is a tradecraft that requires a lifetime of dedication and sacrifice to reach the top of the pyramid.2d ago
SuhailmalikFlareVM Malware Analysis Lab: Setup and OperationWelcome to the FlareVM Malware Analysis Lab article! In this guide, we’ll explore how to set up, configure, and operate a malware analysis…Mar 20
Y_NeXRoThe Fellowship of Malware: A Journey to Build Your Own C2 in Rusta day in the life of a MaaS engineer2d ago
Xavier Mirabelli-MontaninXavier Mirabelli-Montan’s BlogMacOS users beware! AMOS TrojanA couple of weeks ago, I experienced a first — a trojan horse on MacOS, and it wasn’t pretty…Oct 4, 202320