John NathanIs Purple Teaming the Answer to Evolving Cyber Threats?Cyber threats are evolving at an unprecedented rate, making it increasingly difficult for organizations to defend against them using…3d ago
InPosts By SpecterOps Team MembersbyLuke PaineTo Infinity and Beyond!Increasing our understanding of EDR capabilities in the face of impossible odds.May 301
EricaZelicLDAP Queries for Offensive and Defensive OperationsThis article was originally written in July 2023 and was moved here in November 2024.Nov 8Nov 8
hacksplainingEnrichment data for your home lab: HijackLibs and ElasticsearchAlongside streaming endpoint and network telemetry from your lab environment into your Elasticsearch instance, you also have the…Nov 26Nov 26
InOSINT TeambyVikas ChauhanDetect APT Group With Wazuh Part OneDetecting the STRONTIUM/Forest Blizzard APT Group with WazuhNov 23Nov 23
John NathanIs Purple Teaming the Answer to Evolving Cyber Threats?Cyber threats are evolving at an unprecedented rate, making it increasingly difficult for organizations to defend against them using…3d ago
InPosts By SpecterOps Team MembersbyLuke PaineTo Infinity and Beyond!Increasing our understanding of EDR capabilities in the face of impossible odds.May 301
EricaZelicLDAP Queries for Offensive and Defensive OperationsThis article was originally written in July 2023 and was moved here in November 2024.Nov 8
hacksplainingEnrichment data for your home lab: HijackLibs and ElasticsearchAlongside streaming endpoint and network telemetry from your lab environment into your Elasticsearch instance, you also have the…Nov 26
InOSINT TeambyVikas ChauhanDetect APT Group With Wazuh Part OneDetecting the STRONTIUM/Forest Blizzard APT Group with WazuhNov 23
August van sickleIs Azure VMInsight capable of providing some security for your Azure Resources?VM insights provides a quick and easy method for getting started monitoring the client workloads on your virtual machines and virtual…Nov 25
ShereenLeveraging Caldera for Adversary EmulationC2 Simulation using Sandcat agent on Linux TargetJul 31
InInfoSec Write-upsbySandeep SaxenaPurple Team Activities: Where Offense Meets Defense to Strengthen Cyber ResiliencePurple team activities serve as a bridge between red and blue teams, combining offensive tactics with defensive strategies to enhance an…Nov 18