5 min read
Cybersecurity Research Using a few tricks we can make a PE payload, that looks like a PDF - including file name.
Using a few tricks we can make a PE payload, that looks like a PDF - including file name.
Exploiting suo and csproj files recently gained attention, used in attacks on Cybersecurity researchers. We found another way
We dive into deeper water today, looking at GSM3 and briefly into SS7.
A suprise special for everyone, who knows what this date means to us.
A Comprehensive Guide for Modern Pentesters
At times, it will be handy to have all complementary evasion commands at hand. We tried to compile the ultimate list, without going overboard.