Loading...

Binary Ninja Plugin: fix-stomped-imports

Recently, in response to a customer incident we needed to reverse engineer a malware sample of WhiteRabbit ransomware that proved to be tricker than expected. As we'll see, this sample maps a PE [...]

By |2024-09-18T13:29:21+00:00September 18, 2024|

Creating an IR Nightmare Drop Box

A common objective of physical assessments is placement of a drop box to establish communication out of the network environment. A few years ago, the choices were limited to NUC or a Raspberry [...]

By |2023-04-21T08:59:37+00:00April 21, 2023|

Using LoRa as a Side Channel

This article will focus on using a LoRa to create a side channel using a public LoRa infrastructure. By using a gateway and endpoints defined in a LoRa network service, it is possible [...]

By |2023-04-21T09:11:46+00:00April 19, 2023|

PoshC2 Improved HTML Reports

Red team operators need detailed and accurate C2 report output in order to conduct high quality work. Consequently, reporting has always been a key element of PoshC2. With this update, PoshC2s reporting engine [...]

By |2021-01-06T18:06:56+00:00January 6, 2021|

PoshC2 – new features

There have been a few cool updates to PoshC2, our public Command & Control (C2) software, since we first released it. In this post, we’ll walk you through some of these new features [...]

By |2016-12-01T14:48:55+00:00December 1, 2016|
Go to Top