,

Extending C2 Lateral Movement – Invoke-Pbind

/
Invoke-Pbind is a mini post exploitation framework written in…

Using PoolTags to Fingerprint Hosts

/
Commonly, malware will fingerprint the host it executes on, in…
C:\Users\coakley\Desktop\labs.nettitude.com\Blogs\2018\Avecto\Pictures\Avecto_Block.png

CVE-2017-16245 & CVE-2017-16246: Avecto Defendpoint Multiple Vulnerabilities

/
Avecto Defendpoint is an endpoint protection product which, according…
Z:\Desktop\pyshc2.png
,

Python Server for PoshC2

/
We are delighted to announce the release of our PoshC2 Python…
,

COM and the PowerThIEf

/
Recently, Component Object Model (COM) has come back in a big…

CVE-2018-6851 to CVE-2018-6857: Sophos Privilege Escalation Vulnerabilities

/
We have recently disclosed a list of vulnerabilities to Sophos…

CVE-2018-10956: Unauthenticated Privileged Directory Traversal in IPConfigure Orchid Core VMS

/
Affected Software: IPConfigure Orchid Core VMS (All versions…

Introducing Prowl

/
Prowl was initially designed as an in house tool to aid engagements…

Apache mod_python for red teams

/
Nettitude’s red team engagements are typically designed to…