In this article we explain, how and why some UAC Bypasses no longer work, and what you can do about it.
pentesting
View All C2 True Cybercrime Pentesting Cybersecurity Cybersecurity Insights Evasion Enumeration Cybersecurity Research Operational Security RedTeam Privilege Escalation Persistence Physical Access Offensive Security Social Engineering
2 min read
Evasion 7 min read
RedTeam We're looking at common tools and techniques that fully work in 2024, like the Aircrack-ng suite and additional tools for effective Wi-Fi security testing.
4 min read
True Cybercrime When you start into Ethical Hacking, you may come from a lot of career pathes. For us this meant, we never before had contact or experience with the digital, criminal underworld. We had a lot to learn.
3 min read
Cybersecurity While doing OSINT recently, we stumbled across a way to enumerate Facebook Users - without being logged-in.
36 min read
Cybersecurity This is the latest, 2024 Germany & EU version of Open Source Intelligence. All tried and tested.
32 min read
True Cybercrime While the usual tipps on Operational Security are rather generic, we took a deep dive and looked into TrueCrime cases.