2024
2023
- 08 Dec Subdomain Takeovers
- 20 Aug The Evolution Of Evasion
- 20 Jul C2 Smackdown Empire Vs Mythic
- 10 Apr Adversary Emulation Exercises
- 08 Mar Bloodhound basics
- 13 Jan Sliver vs Havoc
2022
- 16 Dec Breaking Down Creating A Redteam Framework
- 17 Nov Malvertising Continued
- 18 Oct Do You Want To Be A Millionaire
- 23 Sep How AV Hooks NTDLL
- 06 Sep Please pardon the mess!
- 29 Aug Setting Up A Phishing Platform With GoPhish
- 27 Jul A Beginners Guide To Everything WebApp Pentesting
- 07 Jun Covenant In 2022
- 05 May Hiding In Alternate Data Streams
- 25 Apr Switchblade To Swiss Army Knife: Expanding The Toolset With Python
- 23 Mar Sometimes Projects Don't Pan Out
- 18 Jan CVE-2021-3919: Using HP Omen Gaming Center Offensively
- 01 Jan Browser Password Safes
2021
- 23 Dec Detecting When Someone Isnt Who They Say They Are
- 30 Nov Lessons In C2 From The CIA
- 03 Nov Custom Encoding For Shellcode
- 28 Oct Can You Tell Real From Fake: Lightshot Malware Campaign
- 24 Oct DLL Hijacking
- 21 Sep CVE-2020-13958 Full Kill Chain
- 25 Aug Defeating Defender
- 21 Jul Examining Python Malware And AV Detection
- 20 Jul Is Windows Defender Up To Par?
2020
- 14 Jul Using YARA To Detect Python Executables
- 16 May Containerizing Your C2: Nuages, Docker, & A Dusty Pi
- 15 May Setting Up Grafana To Display Nessus Results And Jira Tasks
- 16 Feb HTB - Nest Writeup
2019
- 21 Feb MSHTA Files & Exploitations
2018