How to Exfiltrate AWS EC2 Data

/
As Cloud infrastructure has become common, it has also become…

Maritime Malware Campaigns - Document Payloads

/
As part of our research into threats facing the marine and offshore…

DerbyCon 2019 CTF Write Up

/
We recently returned from the always excellent DerbyCon 2019…
C:\Users\coakley\Desktop\download (3).png

Cross Site Scripting (XSS) Payload Generator

/
This post will help you to evade some of those tricky cross site…

CVE-2019-7315: Genie Access WIP3BVAF IP Camera Directory Traversal

/
We have discovered a directory traversal vulnerability that affects…

Operational Security with PoshC2 Framework

/
This post describes a new capability that has been deployed within…

CVE-2017-18019: Privilege Escalation via a Kernel Pointer Dereference

/
A little while ago, I discovered a vulnerability, CVE-2017-18019,…
,

Introducing PoshC2 v4.8 - includes C# dropper, task management and more! - Part One

/
We recently released version 4.8 of PoshC2 Python, which includes…