NeedPester-ing LOLBASWhile messing around with Pester.bat from the LOLBAS project, it’s mentioned that it can be executed from1d ago
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 112
lainkusanagiObfuscating Office Macros to Evade DefenderHello everyone today I will show a method to obfuscate vba macros to make office files for phishing that evade Microsoft Defender.Dec 3Dec 3
Josh SummittAutomate PenTest Reports with BoilerplatesIf you have been doing penetration testing for any length of time, you probably have a personal database of vulnerability descriptions…1d ago1d ago
InEnrique DansbyEnrique DansWhen companies move fast, they do more than break thingsThe expression is attributed to Mark Zuckerberg in the early days of Facebook, and referred to a culture in which technical excellence…Nov 8, 20237Nov 8, 20237
NeedPester-ing LOLBASWhile messing around with Pester.bat from the LOLBAS project, it’s mentioned that it can be executed from1d ago
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 112
lainkusanagiObfuscating Office Macros to Evade DefenderHello everyone today I will show a method to obfuscate vba macros to make office files for phishing that evade Microsoft Defender.Dec 3
Josh SummittAutomate PenTest Reports with BoilerplatesIf you have been doing penetration testing for any length of time, you probably have a personal database of vulnerability descriptions…1d ago
InEnrique DansbyEnrique DansWhen companies move fast, they do more than break thingsThe expression is attributed to Mark Zuckerberg in the early days of Facebook, and referred to a culture in which technical excellence…Nov 8, 20237
Spider4Email verification bypass due to race condition.One day, I decided to hunt on a security services company’s public program with a limited scope. In the past, I hesitated with public…Jul 2112
Mike CvetYour Product is an Abuse VectorOutputs of the consumer Internet product development process are launched into consistently adversarial online environments.Jul 16, 20231