Explore >> Select a destination


You are here

bohops.com
| | pentestarmoury.com
19.2 parsecs away

Travel
| | Introduction and Intent Since watching FireEye FLARE's 'WhyMI So Sexy?' at Derbycon last September, I have wanted to better understand WMI Events and apply them to offensive security operations. I saw the potential, but my comprehension was lacking and a comprehensive offensive WMI toolset did not exist. I was recently taken to school on WMI...
| | www.huntandhackett.com
11.0 parsecs away

Travel
| | Explore how the Sliver framework is used by threat actors for covert control and information gathering. Learn about detection methods and hunting tactics in this insightful post.
| | adsecurity.org
13.1 parsecs away

Travel
| |
| | blog.adnansiddiqi.me
69.5 parsecs away

Travel
| Learn the basics of Large Language Models (LLMs) in this introduction to GenAI series. Discover how LLMs work, their architecture, and practical applications like customer support, content creation, and software development.