red-team Weaponizing Havoc: Stealthy DLL Execution with regsvr32 via WebDav Fileless execution now possible for LNK files!
red-team Red Teaming with Sliver C2 During Red Teaming operations, machines will be compromised and controlled remotely to allow the operator to follow down the kill chain. The infrastructure and tooling is partially different than during penetration tests. We need to have a tool which allows us to: * Centralize and organize the entire operation * Enable multiple
red-team Use Pwntools to level up your Toolset While the standard hacking toolset can get you far, there will be some challenges that require you to be able to craft your own. I have used pwntools numerous times throughout my learning path, and now I want to show you why you should add this powerful tool to your