
Today, pretty much all tools and methods are fair game when it comes to both Offensive and Defensive Security, especially when we're talking about Social Engineering.
Today, pretty much all tools and methods are fair game when it comes to both Offensive and Defensive Security, especially when we're talking about Social Engineering.
In this article we explain, how and why some UAC Bypasses no longer work, and what you can do about it.
After a conversation about evasion techniques, we asked about new ones.
Too good to let it rot on the harddrive. Some older notes on Evasion and C# IL, Evasion attempts and more
We're looking at common tools and techniques that fully work in 2024, like the Aircrack-ng suite and additional tools for effective Wi-Fi security testing.
When you start into Ethical Hacking, you may come from a lot of career pathes. For us this meant, we never before had contact or experience with the digital, criminal underworld. We had a lot to learn.