Archive¶
2019¶
- March 2019 - Git clone all organizational repos
- January 2019 - Penetration Testing Pasties
2018¶
- November 2018 - A Deep Dive into Cobalt Strike Malleable C2
- June 2018 - Threat Get's a Vote: Applying a Threat-Based Approach to Security Testing
- May 2018 Threat Mitigation Strategies and Technical Recommendations Part 2
- February 2018 - Automating Apache mod_rewrite and Cobalt Strike Malleable C2 Profiles
- January 2018 - Threat Mitigation Strategies Part 1
- January 2018 - HostEnum - Updates and Usage
2017¶
- October 2017 - Borrowing Microsoft MetaData and Signatures to Hide Binary Payloads
- September 2017 - Install BloodHound on Ubuntu
- May 2017 - [Empire - Modifying Server C2 Indicators(threatexpress/2017/empire-modifying-server-c2-indicators/)
- May 2017 - invoke-hostenum - A PowerShell Host Situational Awareness Tool
- March 2017 - Leveraging Expired Domains for Red Team Engagements
2016¶
- December 2016 - Slack Notifications for Cobalt Strike
- October 2016 - SubShell and TinyShell - Custom Covert Webshells
- September 2016 - New Information Security and Red Teaming Blog Threat Express by MINIS