Explore >> Select a destination


You are here

macrosec.tech
| | pentestlaboratories.com
4.2 parsecs away

Travel
| | Microsoft .NET framework is being heavily utilized by threat actors and red teams for defense evasion and staying off the radar during operations. Every .NET binary contains application domains where assemblies are loaded in a safe manner. The AppDomainManager object can be used to create new ApplicationDomains inside a .NET process. From the perspective of...
| | www.securitynik.com
4.8 parsecs away

Travel
| | Leveraging the AlwaysInstallElevated policy, allows an administrator to install a Windows installer package with system level privileges. Th...
| | enigma0x3.net
3.5 parsecs away

Travel
| | A while back I was exploring userland COM and stumbled across some 2011 research by Jon Larimer explaining the dangers of per-user COM objects. Recently Casey Smith (@subtee) started digging into COM and its implications as well, which motivated me to finish the research I had started. After some poking around, I found out that...
| | claroty.com
20.0 parsecs away

Travel
| Claroty discovers a CVE-2020-14511 vulnerability that could allow attackers to crash affected devices and carry out remote code execution. Learn more.