Aardvark InfinityinAardvark InfinityRisk Assignment in Red Teaming: The Unfriendable VariablesIntroduction: The Art and Science of Red TeamingSep 2
MockCertifiedA Cyber Ops Specialist’s role: SimplifiedWe will explore the responsibilities, skills, training, and career prospects of a Cyber Ops Specialist.Jun 6, 2023Jun 6, 2023
Aardvark InfinityinAardvark InfinityRisk Assignment in Red Teaming: The Unfriendable VariablesIntroduction: The Art and Science of Red TeamingSep 2
MockCertifiedA Cyber Ops Specialist’s role: SimplifiedWe will explore the responsibilities, skills, training, and career prospects of a Cyber Ops Specialist.Jun 6, 2023
Corey HartmanSelf Mutating Code: Obfuscation Fun — PART 02In part 01 of this blog post, I covered how you can utilize a function overwrite with shellcode to obfuscate code to make reverse…Dec 23, 2022
Corey HartmanHTTP Covert Channels — Hiding C2 and exfiltration in plain sightI put together a quick little demo of covert channels over HTTP and why they can be not exactly easy to pick out when viewing network…Dec 23, 2022