C:\Users\mr.d0x> whoami_
A quick and easy way to bypass link analyzers by hiding behind Google’s domain.
Continue Reading →Google Drive and OneDrive contain spoofing vulnerabilities that can aid attackers with phishing
Continue Reading →If you run into VirtualBox on a machine during an engagement try some of these methods
Continue Reading →A simple guide on finding exposed AWS S3 buckets and Azure Blobs
Continue Reading →Discovery and exploitation of two Zero-Day vulnerabilities affecting Mcafee Agent < 5.7.4 and McAfee Drive Encryption < 7.2.9.5
Continue Reading →Skype is plagued with spoofing vulnerabilities that Microsoft did not think need ‘immediate security servicing’
Continue Reading →Unpatched or misconfigured McAfee components will make life much easier during a penetration test or red team assessment
Continue Reading →A continuation of my series into abusing Microsoft’s debugging tools for red teams. This time I show how to create a memory dump of LSASS with the Adplus debugging tool
Continue Reading →Masquerading execution behind the Microsoft signed binary remote.exe
Continue Reading →