Skip content

111 120 194 results

Filter by

  • Prowl

    Prowl is an open source data harvesting tool written in Python to help alleviate some of the more...

    Read more
  • Apache mod_python for red teams

    Nettitude’s red team engagements are typically designed to be as highly targeted and as stealthy as possible. For...

    Read more
  • WinDbg: using pykd to dump private symbols

    We’ve recently been conducting some reverse engineering and vulnerability analysis on an Anti Virus (AV) product and wanted...

    Read more
  • Using Frida to Bypass Snapchat’s Certificate Pinning

    We have recently published an article discussing the basics of certificate pinning – TLS Certificate Pinning 101. We...

    Read more
  • TLS Certificate Pinning 101

    Certificate pinning is the process of associating a host with their expected X.509 certificate or public key. Once...

    Read more
  • CVE-2017-7351: REDCap 7.0.0 - 7.0.10 SQL Injection

    A SQL injection vulnerability exists in REDCap versions 7.0.0 – 7.0.10.  This has been designated CVE-2017-7351.

    Read more
  • Making PoshC2 More Accessible With a $5 VPS

    Users may find it difficult to host a PoshC2 server as it requires a Windows host, either directly...

    Read more
  • CVE-2019-9702: Symantec Encryption Desktop Local Privilege Escalation - Exploiting...

    These vulnerabilities remain unpatched at the point of publication.  We have been working with Symantec to try and...

    Read more
  • PoshC2 v3 with SOCKS Proxy (SharpSocks)

    We’ve been working on quite a few changes since the release of PoshC2 v2, our public Command &...

    Read more
  • DerbyCon 2017 CTF Write Up

    The excellent Derbycon 2017 has just come to an end and, just like last year, we competed in the Capture The...

    Read more

Error

Error

No results found

No results found that match your query

Loading results