|
You are here |
www.wietzebeukema.nl | ||
| | | | |
blog.cyber5w.com
|
|
| | | | | Analysis of some famous JS obfuscation techniques | |
| | | | |
taeluralexis.com
|
|
| | | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | | |
pentestlab.blog
|
|
| | | | | Group policy preferences allows domain admins to create and deploy across the domainlocal users and local administrators accounts. This feature was introduced in Windows 2008 Server however it can be abused by an attacker since the credentials of theseaccounts are stored encrypted and the public key is published by Microsoft.This leaves the door open to... | |
| | | | |
www.seqrite.com
|
|
| | | Seqrite Labs uncovers Silent Lynx, a new APT group targeting government entities in Kyrgyzstan and neighboring nations. This in-depth analysis explores their campaigns, including malicious ISO files, C++ loaders, PowerShell scripts, and Golang implants, leveraging Telegram for command and control. | ||