Forrest KaslerinPosts By SpecterOps Team MembersPhish Out of WaterBypassing Web Proxies so Your Phish Don’t Suffocate1d ago
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 111
CICADA8Process Injection is Dead. Long Live IHxHelpPaneServerProcess Injection without Process Injection. Exploring cross-session activation mechanisms to steal someone else’s session using COM2d ago2d ago
Enrique DansinEnrique DansWhen companies move fast, they do more than break thingsThe expression is attributed to Mark Zuckerberg in the early days of Facebook, and referred to a culture in which technical excellence…Nov 8, 20237Nov 8, 20237
Forrest KaslerinPosts By SpecterOps Team MembersPhish Out of WaterBypassing Web Proxies so Your Phish Don’t Suffocate1d ago
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 111
CICADA8Process Injection is Dead. Long Live IHxHelpPaneServerProcess Injection without Process Injection. Exploring cross-session activation mechanisms to steal someone else’s session using COM2d ago
Enrique DansinEnrique DansWhen companies move fast, they do more than break thingsThe expression is attributed to Mark Zuckerberg in the early days of Facebook, and referred to a culture in which technical excellence…Nov 8, 20237
Forrest KaslerinPosts By SpecterOps Team MembersDrink Like a PhishHow to Make Your Phishing Sites Blend InJul 9
AnareyvazzadeHow to gain shell with SQL injection ?Firstly, let’s talk about what SQL is and what SQL injection entails.21h ago
Mike CvetYour Product is an Abuse VectorOutputs of the consumer Internet product development process are launched into consistently adversarial online environments.Jul 16, 20231