Skip content

71 80 197 results

Filter by

  • Introducing FComm - C2 Lateral Movement

    Over the past few years, we have found a few edge cases where the traditional lateral movement communication...

    Read more
  • VM Detection Tricks, Part 1: Physical memory resource maps

    In this series we’ll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021....

    Read more
  • PoshC2 Improved HTML Reports

    Red team operators need detailed and accurate C2 report output in order to conduct high quality work. Consequently,...

    Read more
  • The fireeye hack

    With the recent hack of FireEye, there have been many questions circulating among cyber security experts and the...

    Read more
    LRQA logo on navy background
  • CVE-2020-14418: madCodeHook Library Local Privilege Escalation

    Nettitude discovered a vulnerability in the ‘madCodeHook’ third party library which caused a number of security products, including...

    Read more
  • CVE-2020-27708: Electronic Arts (EA) Origin - Local Privilege Escalation

    We recently assessed the security posture of Electronic Arts Origin Client and discovered a privilege escalation issue that...

    Read more
  • Introducing PoshC2 v7.0

    There have been some big improvements and new features added to PoshC2 and we’re excited to announce the...

    Read more
  • PoshC2

    PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral...

    Read more
  • How to use docker in your penetration testing endeavours

    In the following post, we've sat down with Kirk Hayes; Senior Security Consult in the US, to...

    Read more
    LRQA logo on navy background
  • Detecting PoshC2 - Indicators of Compromise

    As a counterpart to the release of PoshC2 version 6.0 we are providing a list of some of...

    Read more

Error

Error

No results found

No results found that match your query

Loading results