Hi Friends I would like to share some tricks and simple steps on impersonating user with CobaltStrike. There is situation where you have compromised a
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi Friends I would like to share some tricks and simple steps on impersonating user with CobaltStrike. There is situation where you have compromised a
Hi Friends. I did some excercise on the pentest in order to refresh my knowledge. During my exercise, I was progressing on certain attack on
Hi Friends Just exercise arround with some vulnerable box available. I found something simple but effective in escalating our privilege. During my post exploitation, I
Hallo Friends… Today, I going to write a very simple Cobaltstrike redirector with Nginx which will help you to hide your C2 server from being
My Friends, Just a quick simple and very basic tutorial on how to create an automation to extract malware configuration from PE file. I made
Hello Friends, Well finally I am back after stoping for quite some times, There were many other activities took my concentration away from making a