We already explored many simple pathes to be able to run exe files while bypassing EDR like Defender. Now we go a step further.
redteam
View All C2 True Cybercrime Pentesting Cybersecurity Cybersecurity Insights Evasion Enumeration Cybersecurity Research Operational Security Privilege Escalation Persistence Physical Access RedTeam Offensive Security Social Engineering
2 min read
Evasion 5 min read
Cybersecurity Research About one year ago we proposed the use of alternative coding styles to evade code scanners. Guess we gotta prove that it works.
5 min read
Cybersecurity Research Using a few tricks we can make a PE payload, that looks like a PDF - including file name.
2 min read
Cybersecurity Research Exploiting suo and csproj files recently gained attention, used in attacks on Cybersecurity researchers. We found another way
11 min read
RedTeam We dive into deeper water today, looking at GSM3 and briefly into SS7.
8 min read
Social Engineering Cognitive ease and cognitive strain are two essential concepts in social engineering and psychology, playing a role in everyday human interaction, in combo with Decision Fatique it's the ultimate tool