This blog post will cover how to execute a payload on opening a powerpoint presentation.
offensive security
View All C2 True Cybercrime Pentesting Cybersecurity Cybersecurity Insights Evasion Enumeration Cybersecurity Research Operational Security RedTeam Privilege Escalation Persistence Physical Access Offensive Security Social Engineering
2 min read
Persistence 4 min read
True Cybercrime Today, pretty much all tools and methods are fair game when it comes to both Offensive and Defensive Security, especially when we're talking about Social Engineering.
2 min read
Evasion In this article we explain, how and why some UAC Bypasses no longer work, and what you can do about it.
7 min read
Evasion After a conversation about evasion techniques, we asked about new ones.
7 min read
RedTeam We're looking at common tools and techniques that fully work in 2024, like the Aircrack-ng suite and additional tools for effective Wi-Fi security testing.
4 min read
True Cybercrime When you start into Ethical Hacking, you may come from a lot of career pathes. For us this meant, we never before had contact or experience with the digital, criminal underworld. We had a lot to learn.