|
You are here |
0xcybery.github.io | ||
| | | | |
www.wietzebeukema.nl
|
|
| | | | | By manipulating environment variables on process level, it is possible to let trusted applications load arbitrary DLLs and execute malicious code. This post lists nearly 100 executables vulnerable to this type of DLL Hijacking on Windows 11 (21H2); it is demonstrated how this can achieved with just three lines of VBScript. | |
| | | | |
taeluralexis.com
|
|
| | | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | | |
www.uptycs.com
|
|
| | | | | ||
| | | | |
www.dragos.com
|
|
| | | Explore Dragos' Q1 2025 ransomware analysis for ICS/OT environments. Discover key trends, threat actors, and mitigation strategies for industrial networks. | ||