Explore >> Select a destination


You are here

blog.0x7d0.dev
| | www.huntandhackett.com
5.0 parsecs away

Travel
| | Explore how the Sliver framework is used by threat actors for covert control and information gathering. Learn about detection methods and hunting tactics in this insightful post.
| | kasperjohansen.net
5.8 parsecs away

Travel
| | From time to time, it's required to "do something" in user context on a modern managed cloud only Windows device. Installing apps and pushing policies via Microsoft Intune is easy enough, it's part of the Intune UI to select either system or user context when creating a new application or selecting
| | www.syspanda.com
5.0 parsecs away

Travel
| | I wanted to write about the importance of checking for new services as this is an avenue in which attackers leverage their persistence methods. While looking at newly created services... [Continue Reading]
| | blog.redcrowlab.com
28.9 parsecs away

Travel
| Much of the time people engage in short term security testing such as penetration tests, vulnerability assessments, code reviews, etc. Often these are 1-2 weeks with some period for reporting. The approach to conducting these sorts of projects typically includes the following types of steps: * Heavy reliance on automated tools