|
You are here |
redteaming.co.uk | ||
| | | | |
pentestlaboratories.com
|
|
| | | | | Microsoft .NET framework is being heavily utilized by threat actors and red teams for defense evasion and staying off the radar during operations. Every .NET binary contains application domains where assemblies are loaded in a safe manner. The AppDomainManager object can be used to create new ApplicationDomains inside a .NET process. From the perspective of... | |
| | | | |
wsummerhill.github.io
|
|
| | | | | Malware Development Introduction (aka Malware Dev 101), Part 1 | |
| | | | |
taeluralexis.com
|
|
| | | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | | |
biobreak.wordpress.com
|
|
| | | It's the start of the week, so why not start it off right with some great tunes? Enjoy your latest Bio Break Mix Tape, a random collection of awesome songs that I've discovered lately and want to pass on to you to enjoy too... https://www.youtube.com/watch?v=VPPEPsjxGT4&pp=ygUnS2luZyBLb2JyYSAtIElyb24gRWFnbGUgKE5ldmVyIFNheSBEaWUp https://www.youtube.com/watch?v=002ei4fbiCk&pp=ygUfSW5kZXBlbmRlbmNlIERheSBtb3JzZSBjb2RlIG9zdA%3D%3D https://www.youtube.com/watch?v=UG7P0_DiJpE&pp=ygUMc2FsdCBibHVzdGVy https://ww... | ||