Explore >> Select a destination


You are here

redteaming.co.uk
| | blog.talosintelligence.com
14.9 parsecs away

Travel
| | Talos also discovered a new PowerShell command-line argument embedded in the LNK file to bypass anti-virus products and download the final payload into the victims' host.
| | pentestlab.blog
12.6 parsecs away

Travel
| | Windows Management Instrumentation (WMI) enables system administrators to perform tasks locally and remotely. From the perspective of red teaming WMI can be used to perform several activities such as lateral movement, persistence, situational awareness, code execution and as a command and control (C2). The fact that WMI is part of Windows that exists in almost...
| | intezer.com
14.6 parsecs away

Travel
| | This deep dive aims to guide you through .NET reverse engineering, equipping you with the essential knowledge to analyze .NET malware.
| | blog.sicuranext.com
72.0 parsecs away

Travel
| A new cyber-criminal group known as Hunt3r Kill3rs has recently emerged, claiming responsibility for a series of attacks on critical infrastructure with the final political goal of attacking Israeli companies and Israeli allies. This group has primarily focused on industrial control systems (ICS), communication networks, and vulnerable web applications. Their