Loading...

Introducing SharpWSUS

Today, we're releasing a new tool called SharpWSUS.  This is a continuation of existing WSUS attack tooling such as WSUSPendu and Thunder_Woosus. It brings their complete functionality to .NET, in a way that [...]

By |2022-05-05T12:10:08+00:00May 5, 2022|

Introducing MalSCCM

During red team operations the goal is often to compromise a system of high value. These systems will ideally be segmented from the wider network and locked down to prevent compromise. However, the [...]

By |2022-05-04T14:19:14+00:00May 4, 2022|

Introducing RunOF – Arbitrary BOF tool

A few years ago, a new feature was added to Cobalt Strike called “Beacon Object Files” (BOFs). These provide a way to extend a beacon agent post-exploitation with new features, perhaps to respond [...]

By |2022-03-09T15:48:37+00:00March 2, 2022|

Explaining Mass Assignment Vulnerabilities

Programming frameworks have gained popularity due to their ability to make software development easier than using the underlying language alone. However, when developers don’t fully understand how framework functionality can be abused by [...]

By |2022-01-25T16:25:10+00:00January 25, 2022|

Introducing Process Hiving & RunPE

Download our whitepaper and tool This blog is a condensed version of a whitepaper we've released, called "Process Hiving".  It comes with a new tool too, "RunPE".  You can download these at [...]

By |2021-11-15T20:47:31+00:00September 2, 2021|
Load More Posts
Go to Top