Python malware is on the rise, with many low level criminals switching to it for it's ease of use, low entry level, and many libraries available to choose from. However, the most widely used tools ...
Why? I wanted a low powered container platform and had a rPi 3b sitting around collecting dust. This project isn’t for any practical reasons, but I wanted to emulate what bigger companies do, ...
This is a run through on setting up Grafana to pull data from Nessus and tasks from Jira. Prerequisites: Two VMs capable of 4 GB of RAM, 2 Cores, 32 GB Disk space each.Nessus Version: Nessus-...
This was my first Hack The Box challenge and I've been waiting for so long to post this. It took a lot of work and a lot of trying to work through problems I created for myself, ...
What is it:Microsoft HTML Application Host and CHM files. The program is located at C:\Windows\SysWOW64An outdated relic on Windows machines used to host help documents.Microsoft has documented tha...
What is it?This is a built in function for C# in Microsoft Windows that essentially allows arbitrary unsigned code execution. It is part of the .NET framework and it works by combining a serialized...
I came across an interesting attack recently when browsing any.run submissions.It was a PDF that had a hyper link in it to click.The link went to appengine.google.com - a pretty innocuous URL. Anyo...
C2 Architecture is one of the most important aspects of the APT world.Proper C2 architecture lets you subvert IDS, antivirus, and network analysts.It lets you exfiltrate data. It lets you move late...
<div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="...
A new version of content is available.