C:\Users\mr.d0x> whoami_
This blog explores another Chromium command line flag that can be used to spy on a user by continuously taking pictures through their camera and recording their microphone audio
Continue Reading →This blog explores a Chromium command line flag and how it can be used to spy on a user by continuously taking screenshots of their screen
Continue Reading →Phishing with Progressive Web Apps and UI manipulation
Continue Reading →Hijacking SentinelOne’s “Scan For Threats” context menu option and creating your own option for persistence
Continue Reading →This article explores a phishing technique that emulates a file archiver software in the browser while using a .zip domain
Continue Reading →In this blog post I show how Chromium’s application mode allows us to easily create realistic desktop phishing applications
Continue Reading →Dumping tokens from Microsoft Office desktop applications’ memory
Continue Reading →Exploring WebView2 applications and how they can be used for credential and cookie theft
Continue Reading →Analyzing Cortex XDR and finding ways to bypass it
Continue Reading →ForcePoint One DLP EndPoint lacks tamper protection allowing attackers to disable the product, raise privileges and establish persistence on the machine
Continue Reading →