In the previous blog posts, we looked at how attackers and red teamers can abuse COM…
In the previous blog post, We have talked about COM Objects and how you can…