
2 min read
Cybersecurity Research Exploiting suo and csproj files recently gained attention, used in attacks on Cybersecurity researchers. We found another way
Exploiting suo and csproj files recently gained attention, used in attacks on Cybersecurity researchers. We found another way
We dive into deeper water today, looking at GSM3 and briefly into SS7.
A Comprehensive Guide for Modern Pentesters
C2 Powershell Empire is a classic - but can you still use it with EDR (Defender) in place?
Let's try and do things like they're done in real attacks. While the media recently was all over ConnectWise ScreenConnect, we instead focus on AnyDesk - which is used by many Cybercriminals these days - in an Assumed Breach scenario.
We created a custom reverse shell from scratch and made it persistent - the result is scary, to say the least.