blog category

Research & Tradecraft

image for WSH Injection: A Case Study

Research & Tradecraft

WSH Injection: A Case Study

By: Matt Nelson
Aug 3, 2017 • 4 min read
Read Post
image for Offensive Encrypted Data Storage (DPAPI edition)

Research & Tradecraft

Offensive Encrypted Data Storage (DPAPI edition)

By: Will Schroeder
Jul 31, 2017 • 5 min read
Read Post
image for Bypassing AMSI via COM Server Hijacking

Research & Tradecraft

Bypassing AMSI via COM Server Hijacking

By: Matt Nelson
Jul 19, 2017 • 6 min read
Read Post
image for Host-based Threat Modeling & Indicator Design

Research & Tradecraft

Host-based Threat Modeling & Indicator Design

By: Jared Atkinson
Jul 18, 2017 • 18 min read
Read Post
image for The PowerView PowerUsage Series #1

Research & Tradecraft

The PowerView PowerUsage Series #1

By: Will Schroeder
Jul 17, 2017 • 5 min read
Read Post
image for Phishing Against Protected View

Research & Tradecraft

Phishing Against Protected View

By: Matt Nelson
Jul 13, 2017 • 6 min read
Read Post
image for A Pentester’s Guide to Group Scoping

Research & Tradecraft

A Pentester’s Guide to Group Scoping

By: Will Schroeder
Jun 20, 2017 • 15 min read
Read Post
image for Serving Random Payloads with Apache mod_rewrite

Research & Tradecraft

Serving Random Payloads with Apache mod_rewrite

By: Jeff Dimmock
Jun 12, 2017 • 5 min read
Read Post
image for A Three Year Retrospective

Research & Tradecraft

A Three Year Retrospective

By: Will Schroeder
May 24, 2017 • 10 min read
Read Post