Homepage
Open in app
Sign in
Get started
MII Cyber Security Consulting Services
Tale Stories of Our Journey in Cyber Security Industry
Offensive
Defensive
Microsoft Security
Research
Write-Up
Follow
Deploy “Sneaky” Gophish for Effective Spear Phishing
Deploy “Sneaky” Gophish for Effective Spear Phishing
Assuming that we are configuring a server that is still ‘fresh’ for installation, this tutorial will describe the steps from the beginning…
November Rain
Sep 2
Evaluating Organisation’s Cyber Defense Capability with MITRE Top 10 ATT&CK Technique
Evaluating Organisation’s Cyber Defense Capability with MITRE Top 10 ATT&CK Technique
Disclaimer :
Digit Oktavianto
Aug 31
Efficiently Parsing Nessus Data
Efficiently Parsing Nessus Data
Hello everyone, I want to share how I process a lot of data from various segments in my vulnerability assessment project using Nessus. In…
Rio Darmawan
Jul 7
Server-Side Template Injection
Server-Side Template Injection
Information about Server-Side Template Injection
Bryan RB
Jun 20
Leveraging ExifTool to Modify File Metadata and Inject XSS
Leveraging ExifTool to Modify File Metadata and Inject XSS
What is Exiftool?
Vincent ie
Jun 11
Pivoting and Lateral Movement Faster with Ligolo-ng
Pivoting and Lateral Movement Faster with Ligolo-ng
0x1 Introduction
Bukhari Hasan
Jun 2
Nahamcon-CTF 2024 — Forensic (1)
Nahamcon-CTF 2024 — Forensic (1)
Last week, I participated in the NahamCon 2024 CTF, focusing specifically on the forensic challenges. These challenges are designed to…
Faishol Hakim
Jun 2
About MII Cyber Security Consulting Services
Latest Stories
Archive
About Medium
Terms
Privacy
Teams