PinnedUnleash the power of reverse SOCKS5 tunnel in your corporate red teaming and adversary emulation…While commercial EDR solutions have undoubtedly strengthened cyber defence capabilities, they also introduce significant challenges for…Aug 16, 2023Aug 16, 2023
The beauty of applying graph theory in your CTI and threat hunting programsIn cyber threat intelligence, an accurate and prompt data acquisition is always crucial. This process typically involves extracting…Jul 23, 2024Jul 23, 2024
Boost defense evasion when running your C2 implant without direct shell execution in Node.JSRelatively speaking, it usually takes a lot of effort for offensive security professionals when building, debugging, and maintaining their…Nov 23, 2023Nov 23, 2023