|
You are here |
wsummerhill.github.io | ||
| | | | |
pentestlaboratories.com
|
|
| | | | | Microsoft .NET framework is being heavily utilized by threat actors and red teams for defense evasion and staying off the radar during operations. Every .NET binary contains application domains where assemblies are loaded in a safe manner. The AppDomainManager object can be used to create new ApplicationDomains inside a .NET process. From the perspective of... | |
| | | | |
jaylittle.com
|
|
| | | | | Today's post is going to examine an ethical grey area that I currently find to be very relevant. Is it ever okay to ignore responsible disclosure standards for security related issues? Spoiler alert: I'm going to argue that there are cases in which ignoring these standards is not only permissible but the only real ethical course of action. Okay so lets start with some sample code. The below code represents a simple . | |
| | | | |
gist.github.com
|
|
| | | | | GitHub Gist: instantly share code, notes, and snippets. | |
| | | | |
pentestlab.blog
|
|
| | | The accessibility features provide additional options (on screen keyboards, magnifier, screen reading etc.) that could assist people with disabilities to use Windows operating systems easier. However, this functionality can be abused to achieve persistence on a host that RDP is enabled and Administrator level privileges have been obtained. This technique touches the disk, or modification... | ||