delivr.toGWT-Assisted HTML SmugglingWe recently published an article on how high-level languages such as Rust could be compiled into WebAssembly binaries and executed natively…Jul 3
Luke PaineinPosts By SpecterOps Team MembersTo Infinity and Beyond!Increasing our understanding of EDR capabilities in the face of impossible odds.May 301
Mark MoSome ways to dump LSASS.exeAs always this is for educational purposes. I like to find multiple ways to do the same thing. It helps me learn and writing about it help…Jul 2, 2019Jul 2, 2019
Truvis ThorntonAzure Sentinel Workbook/Dashboard: PurpleTeam Event Viewing Dashboard — quickly threat hunt and…Do you need a quick way to find and view events related to an exercise or an active attack? This dashboard allows you to quickly search…Jun 29Jun 29
Dan CovicThe InfoSec Color WheelMost cybersecurity professionals have heard about red and blue teams. But did you know that there are others?Mar 20, 2023Mar 20, 2023
delivr.toGWT-Assisted HTML SmugglingWe recently published an article on how high-level languages such as Rust could be compiled into WebAssembly binaries and executed natively…Jul 3
Luke PaineinPosts By SpecterOps Team MembersTo Infinity and Beyond!Increasing our understanding of EDR capabilities in the face of impossible odds.May 301
Mark MoSome ways to dump LSASS.exeAs always this is for educational purposes. I like to find multiple ways to do the same thing. It helps me learn and writing about it help…Jul 2, 2019
Truvis ThorntonAzure Sentinel Workbook/Dashboard: PurpleTeam Event Viewing Dashboard — quickly threat hunt and…Do you need a quick way to find and view events related to an exercise or an active attack? This dashboard allows you to quickly search…Jun 29
Dan CovicThe InfoSec Color WheelMost cybersecurity professionals have heard about red and blue teams. But did you know that there are others?Mar 20, 2023
Garrett WhiteinPosts By SpecterOps Team MembersDeconstructing Logon Session EnumerationHow we define and create test cases for our purple team runbooksJun 21
delivr.toSVG Smuggling: A picture worth a thousand wordsHTML Smuggling is a common phishing technique, but did you know SVG image files can be used for smuggling too?Jul 24, 2023
No Useless TechBlue team with a streak of RedI’ve been a blue teamer pretty consistently, but there’s always been that streak of red waiting to be unleashed. For the first part of my…Jun 5