Red team operator @MDSecLabs, former bootneck.
rvrsh3ll // Introduction This blog post is intended to give a light overview of device codes, access tokens, and refresh tokens. Here, I focus on the technical how-to for standing […]blackhillsinfosec.com
Dump the memory of any PPL with a Userland exploit chain - GitHub - itm4n/PPLmedic: Dump the memory of any PPL with a Userland exploit chaingithub.com
In our last Assume Breach engagement, the client gave us a domain-joined computer and a VPN access telling it was the only option to access the internal domain. Other computers would be able to...riskinsight-wavestone.com
In this blog post, we present new techniques for recovering the NTLM hash from an encrypted credential protected by Windows Defender…research.ifcr.dk
A simple ptrace-less shared library injector for x64 Linux - GitHub - namazso/linux_injector: A simple ptrace-less shared library injector for x64 Linuxgithub.com