Hacker4UWalkthrough Services (TryHackMe)Services is an intermediate level room in THM that covers fairly common Active Directory attack paths to gain initial access to the system…7h ago1
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 112
Marcin WolakHiring Ethical Hackers in 2024Finding highly skilled ethical hackers and penetrations testers has in the recent years become very challenging. Remote work & education…Jul 235Jul 235
Aardvark InfinityinAardvark Infinity30 Red Team Data Sanitation Programs for Windows using PowerShellData sanitization is a critical component of Red Team operations, especially when it comes to ensuring that sensitive data is securely…2h ago2h ago
Enrique DansinEnrique DansWhen companies move fast, they do more than break thingsThe expression is attributed to Mark Zuckerberg in the early days of Facebook, and referred to a culture in which technical excellence…Nov 8, 20237Nov 8, 20237
Hacker4UWalkthrough Services (TryHackMe)Services is an intermediate level room in THM that covers fairly common Active Directory attack paths to gain initial access to the system…7h ago1
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 112
Marcin WolakHiring Ethical Hackers in 2024Finding highly skilled ethical hackers and penetrations testers has in the recent years become very challenging. Remote work & education…Jul 235
Aardvark InfinityinAardvark Infinity30 Red Team Data Sanitation Programs for Windows using PowerShellData sanitization is a critical component of Red Team operations, especially when it comes to ensuring that sensitive data is securely…2h ago
Enrique DansinEnrique DansWhen companies move fast, they do more than break thingsThe expression is attributed to Mark Zuckerberg in the early days of Facebook, and referred to a culture in which technical excellence…Nov 8, 20237
Nick PowersinPosts By SpecterOps Team MembersRelay Your Heart Away: An OPSEC-Conscious Approach to 445 TakeoverEven within organizations that have achieved a mature security posture, targeted NTLM relay attacks are still incredibly effective after…Aug 1
Mike CvetYour Product is an Abuse VectorOutputs of the consumer Internet product development process are launched into consistently adversarial online environments.Jul 16, 20231