|
You are here |
0xcybery.github.io | ||
| | | | |
forensicitguy.github.io
|
|
| | | | | In this post I want to take a look at a PowerShell-based Cobalt Strike beacon that appeared on MalwareBazaar. This particular beacon is representative of most PowerShell Cobalt Strike activity I see in the wild during my day job. The beacons often show up as service persistence during incidents or during other post-exploitation activity. If you want to follow along at home, the sample I'm using is here: | |
| | | | |
cocomelonc.github.io
|
|
| | | | | ||
| | | | |
int10h.org
|
|
| | | | | Font: IBM DOS ISO8-2x, from the world's biggest collection of classic text mode fonts, system fonts and BIOS fonts from DOS-era IBM PCs and compatibles | |
| | | | |
blog.darkwolfsolutions.com
|
|
| | | September 16, 2024 Episode 13 The Evolving Threat Landscape: A Catalyst for Innovation Author: Brian "BP" Panarello Throughout this series, we've embarked on a journey into the evolving realm of cloud security, navigating the complexities of Zero Trust architectures, the critical role of Cloud | ||