Explore >> Select a destination


You are here

pentestlab.blog
| | taeluralexis.com
3.1 parsecs away

Travel
| | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies.
| | pentestlaboratories.com
3.6 parsecs away

Travel
| | Microsoft .NET framework is being heavily utilized by threat actors and red teams for defense evasion and staying off the radar during operations. Every .NET binary contains application domains where assemblies are loaded in a safe manner. The AppDomainManager object can be used to create new ApplicationDomains inside a .NET process. From the perspective of...
| | mazinahmed.net
4.4 parsecs away

Travel
| | Application and Infrastructure Security Engineering
| | blog.martinig.ch
25.6 parsecs away

Travel
| Architecture is an important asset for good programming and the notion of "pattern" is here to help us apply already trusted code architecture solutions to common problems. Jason McDonald has done a wonderful job to group some of them in a document that should be useful to most software developers. Go to his blog to