Recently Updated Pages
用OSINT技术找回失联8年的童年伙伴
OSINT,即开源情报,是网络安全领域中一项重要的技能。不仅是网络安全,情报界也广泛使用。对于网络安全人员,无论从事红队,还是蓝队,还是威胁狩猎/情报等,OSINT 都能发挥不同的作用。对于...
SEC660/GXPN Review And The Comparison With OSED
Hi folks, it's been quite a while since I last wrote review on training courses and certification...
SAN660以及GXPN感受与心得,以及与OSED的对比
说起来,已经挺久没有写关于培训课程与认证的心得了,即便是通过 OSCE3 之后。在过去几天,我通过了 SEC660 课程所对应的认证 GXPN 的考试,因为我也是第一次接触 SANS 的课程与 ...
CKAN Authenticated SSRF <= 2.9.11/2.10.4
Vulnerability Information Product: Ckan Vendor: https://github.com/ckan Affected Version(s)...
EDRPrison: Borrow a Legitimate Driver to Mute EDR Agent
Hey friends, today I will share a technique that can be used to evade EDR products. I hesitate to...
MutationGate
Background Motivation Considering inline hook is a major detection utilized by EDR products, ...
ReflectiveLoading And InflativeLoading
CobaltStrike's Beacon is essentially a DLL. The raw format payload is a patched DLL file. Through...
[Backup] How Did I Take Over CobaltStrike Servers
Hi folks, today I would like to share how I take over some Cobalt Strike TeamServerswith Quake an...
Use Searching Engines to Hunt For Threat Actors
Background Hi folks, today, I’d like to discuss how to leverage search engines to identify vulne...
Bypass AMSI On Windows 11
Motivation In this article, I want to break down AMSI (Anti-Malware Scan Interface) and its bypa...
Targeted and Efficien Phishing: Alteryx Workflow
Background Recently, my friend who works in the accounting industry has been working hard to lea...