Skip content

51 60 191 results

Filter by

  • Introducing PoshC2 v8.0

    We’re thrilled to announce a new release of PoshC2 packed full of new features, modules, major improvements, and...

    Read more
  • LRQA discovers high-risk Microsoft vulnerability

    Our vulnerability research team recently uncovered a Microsoft bug. In the wrong hands, it would have been damaging...

    Read more
  • CVE-2022-23253 - Windows VPN Remote Kernel Null Pointer Dereference

    CVE-2022-23253 is a Windows VPN (remote access service) denial of service vulnerability that Nettitude discovered while fuzzing the...

    Read more
  • Introducing RunOF - Arbitrary BOF tool

    A few years ago, a new feature was added to Cobalt Strike called “Beacon Object Files” (BOFs). These...

    Read more
  • Explaining Mass Assignment Vulnerabilities

    Programming frameworks have gained popularity due to their ability to make software development easier than using the underlying...

    Read more
  • Process hiving - red teaming whitepaper

    Our red team has created a new technique, and accompanying tool, that allows a red team operator to...

    Read more
  • Introducing Process Hiving & RunPE

    High quality red team operations are research-led. Being able to simulate current and emerging threats at an accurate...

    Read more
  • CVE-2020-26153: Event Espresso Core - Cross Site Scripting

    Nettitude have identified a Cross Site Scripting (XSS) vulnerability within Event Espresso Core. Event Espresso is a WordPress plugin which...

    Read more
  • Advanced Threat Actor Simulation - Red Team Training

    This course will train your already inquisitive mind how to emulate real world threat actors. It’s fast paced...

    Read more
  • How jwt hijacking can be prevented

    JSON Web Tokens (JWTs) are commonly used in many applications to validate the client's identity. However, there are...

    Read more

Error

Error

No results found

No results found that match your query

Loading results