Skip content

51 60 156 results

Filter by

  • Explaining Mass Assignment Vulnerabilities

    Programming frameworks have gained popularity due to their ability to make software development easier than using the underlying...

    Read more
  • Introducing Process Hiving & RunPE

    High quality red team operations are research-led. Being able to simulate current and emerging threats at an accurate...

    Read more
  • CVE-2020-26153: Event Espresso Core - Cross Site Scripting

    Nettitude have identified a Cross Site Scripting (XSS) vulnerability within Event Espresso Core. Event Espresso is a WordPress plugin which...

    Read more
  • PoshC2 - Introducing Native macOS Implants

    Over the past few years, we have seen an increase in the number of macOS environments we are...

    Read more
  • VM Detection Tricks, Part 3: Hyper-V RAW Network Protocol

    This month’s virtual machine detection trick involves detecting the presence of the Hyper-V RAW network protocol. This protocol...

    Read more
  • VM Detection Tricks, Part 2: Driver Thread Fingerprinting

    This year we’re documenting a series of new and as-yet undocumented VM detection tricks. These detection tricks will...

    Read more
  • CVE-2020-24550: Open Redirect in Episerver Find

    During the course of our work, we discovered an open redirect vulnerability in Episerver Find. This has...

    Read more
  • Introducing FComm - C2 Lateral Movement

    Over the past few years, we have found a few edge cases where the traditional lateral movement communication...

    Read more
  • VM Detection Tricks, Part 1: Physical memory resource maps

    In this series we’ll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021....

    Read more
  • PoshC2 Improved HTML Reports

    Red team operators need detailed and accurate C2 report output in order to conduct high quality work. Consequently,...

    Read more

Error

Error

No results found

No results found that match your query

Loading results