|
You are here |
blog.0x7d0.dev | ||
| | | | |
www.syspanda.com
|
|
| | | | | I wanted to write about the importance of checking for new services as this is an avenue in which attackers leverage their persistence methods. While looking at newly created services... [Continue Reading] | |
| | | | |
forensicitguy.github.io
|
|
| | | | | One of my favorite Twitter accounts from the last several years was @cobaltstrikebot, mainly because it was an awesome source of threat intelligence for Cobalt Strike beacons in the wild. The account went dark in June 2023, but its tweets are still around. | |
| | | | |
www.huntandhackett.com
|
|
| | | | | Explore how the Sliver framework is used by threat actors for covert control and information gathering. Learn about detection methods and hunting tactics in this insightful post. | |
| | | | |
roscidus.com
|
|
| | | This post evaluates the programming languages ATS, C#, Go, Haskell, OCaml, Python and Rust to try to decide which would be the best language in which ... | ||