blog category
Research & Tradecraft
Research & Tradecraft
Ghostwriter ❤ Tool Integration
Incorporating new components into existing systems is such a pain, this process has been labeled “Integration...
By: Alexander Sou
Aug 27, 2024 • 5 min read
Read Post
Research & Tradecraft
Navigating the Uncharted: A Framework for Attack Path Discovery
This is the second post in a series on Identity-Driven Offensive Tradecraft, which is also the...
By: Elad Shamir
Aug 20, 2024 • 8 min read
Read Post
Research & Tradecraft
Hiding C2 With Stealthy Callback Channels Write a custom command and control (C2) implant — Check...
By: Forrest Kasler
Aug 14, 2024 • 12 min read
Read Post
Research & Tradecraft
Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover
Even within organizations that have achieved a mature security posture, targeted NTLM relay attacks are still...
By: Nick Powers
Aug 1, 2024 • 13 min read
Read Post
Research & Tradecraft
PHISHING SCHOOL Making Your Malware Look Legit to Bypasses EDR I wanted to write this blog about...
By: Forrest Kasler
Jul 30, 2024 • 8 min read
Read Post
Research & Tradecraft
PHISHING SCHOOL How to Bypass EDR With Custom Payloads If endpoint detection and response (EDR) protections keep...
By: Forrest Kasler
Jul 23, 2024 • 17 min read
Read Post
Research & Tradecraft
The Security Principle Every Attacker Needs to Follow
Earlier this year, I was tasked with developing a follow-on course for our renowned Adversary Tactics:...
By: Elad Shamir
Jul 17, 2024 • 12 min read
Read Post
Research & Tradecraft
PHISHING SCHOOL Bypassing Web Proxies so Your Phish Don’t Suffocate You just fought long and hard...
By: Forrest Kasler
Jul 16, 2024 • 13 min read
Read Post
Research & Tradecraft
Mythic 3.3 Beta: Rise of the Events
A brief overview of Mythic 3.3’s new features Eventing Flows Mythic 3.3 Updates Mythic 3.3 has too many...