|
You are here |
www.codeproject.com | ||
| | | | |
usualsuspect.re
|
|
| | | | | ||
| | | | |
bohops.com
|
|
| | | | | Yes, you read that correctly - "Dynamic Pinvoke" as in "Dynamic Platform Invoke" Background Recently, I was browsing through Microsoft documentation and other blogs to gain a better understanding of .NET dynamic types and objects. I've always found the topic very interesting mainly due to its relative obscurity and the offensive opportunities for defensive evasion.... | |
| | | | |
forensicitguy.github.io
|
|
| | | | | In this post I want to take a look at a PowerShell-based Cobalt Strike beacon that appeared on MalwareBazaar. This particular beacon is representative of most PowerShell Cobalt Strike activity I see in the wild during my day job. The beacons often show up as service persistence during incidents or during other post-exploitation activity. If you want to follow along at home, the sample I'm using is here: | |
| | | | |
www.sonatype.com
|
|
| | | Learn about evolving malware threats, proactive defense strategies, and the role of software composition analysis to protect your development processes. | ||