Skip content

121 130 187 results

Filter by

  • Effectively analysing sysmon logs

    We previously covered setting up and using sysmon (System Monitor), which is part of the Sysinternals suite from Microsoft. In this...

    Read more
  • Putting attackers in hi vis jackets with sysmon

    Sysmon (short for system monitor) has been part of the Sysinternals suite for several years.  It comprises kernel-mode driver...

    Read more
  • More XSS Shenanigans

    In September, we released our XSS Payloads collection of scripts and they went down really well within the pen-testing community....

    Read more
  • Who owns your runtime?

    Can mobile applications trust their own runtime environment? The answer to this burning question that has no doubt...

    Read more
  • Fun with Windows binaries - application whitelist bypass using...

    We were inspired by the work @subTee has done with application whitelisting.  Consequently, we decided to have a hunt around for legitimate...

    Read more
  • PoshC2 - new features

    There have been a few cool updates to PoshC2, our public Command & Control (C2) software, since we...

    Read more
  • An analysis of the RIG exploit kit

    Over the last few weeks, we have observed an increase of RIG exploit kit alarms, delivering CrypMIC ransomware. This...

    Read more
  • Analysing the NULL SecurityDescriptor kernel exploitation mitigation in the...

    We recently discovered a new and quietly released Windows kernel exploitation defence. Exploiting a kernel bug by setting...

    Read more
  • From macro to malware - a step by step...

    We recently received an email which contained a malicious Word macro. Usually, the only thing that changes between malicious Office...

    Read more
  • ZeroPress

    ZeroPress provides a way to quickly catch critical impact ‘low hanging fruit’ vulnerabilities in WordPress. As a...

    Read more

Error

Error

No results found

No results found that match your query

Loading results