Matteo Potito GiorgioDetect Azure Pass Through Authentication Abuse — Azure Hybrid EnvironmentsIn recent years, the cloud computing industry has experienced substantial growth, with three prominent vendors emerging as leaders: Amazon…1d ago
Luke PaineinPosts By SpecterOps Team MembersThe Defender’s Guide to the Windows RegistryIt’s dangerous to defend the registry alone! Take this!Oct 31, 20225
HaircutfishTryHackMe Investigating Windows — Task 1 Investigating WindowsA windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done.Nov 2, 20221Nov 2, 20221
Ibrahim ElgammalSOC287 — Arbitrary File Read on Checkpoint Security Gateway [CVE-2024–24919] by 0xELG4MM4LHey there! Eng. Ibrahim ELgammal (0xEL4MM4L) here, excited to share insights from my journey on the LetsDefend platform. As I continue…1d ago1d ago
Cyber Sam6 Free OSINT Web Tools You Should Be Using6 unique tools that anyone has access to that can be used for OSINT. I give a quick description of each and some examples.Sep 18, 20234Sep 18, 20234
Matteo Potito GiorgioDetect Azure Pass Through Authentication Abuse — Azure Hybrid EnvironmentsIn recent years, the cloud computing industry has experienced substantial growth, with three prominent vendors emerging as leaders: Amazon…1d ago
Luke PaineinPosts By SpecterOps Team MembersThe Defender’s Guide to the Windows RegistryIt’s dangerous to defend the registry alone! Take this!Oct 31, 20225
HaircutfishTryHackMe Investigating Windows — Task 1 Investigating WindowsA windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done.Nov 2, 20221
Ibrahim ElgammalSOC287 — Arbitrary File Read on Checkpoint Security Gateway [CVE-2024–24919] by 0xELG4MM4LHey there! Eng. Ibrahim ELgammal (0xEL4MM4L) here, excited to share insights from my journey on the LetsDefend platform. As I continue…1d ago
Cyber Sam6 Free OSINT Web Tools You Should Be Using6 unique tools that anyone has access to that can be used for OSINT. I give a quick description of each and some examples.Sep 18, 20234
HammazahmedPrefetch Analysis of Malware IntrusionHello readers! Today, we’ll be conducting a malware analysis using prefetch files. I’ve previously covered this on my GitHub repository…2d ago