C:\Users\mr.d0x> whoami_
This is the start of a Twitter recap series which highlights interesting or useful posts that never made it to the blog
Continue Reading →Abuse the way O365 Outlook renders cloud attachments to make malicious executable cloud attachments look like harmless files
Continue Reading →UPDATED: With the announcment that MS Teams allows users outside of an organization to message users, I revisited Teams and added new techniques
Continue Reading →Google Drive’s email file functionality can be used to send phishing emails via the google.com domain
Continue Reading →A new technique showing how an attacker can create calendar invites with spoofed attendees
Continue Reading →Simple changes in process relationship could bypass certain security solutions
Continue Reading →A quick and easy way to bypass link analyzers by hiding behind Google’s domain.
Continue Reading →Google Drive and OneDrive contain spoofing vulnerabilities that can aid attackers with phishing
Continue Reading →If you run into VirtualBox on a machine during an engagement try some of these methods
Continue Reading →A simple guide on finding exposed AWS S3 buckets and Azure Blobs
Continue Reading →