image

Porting Backdoors - Windows rootkits via RESTful API Service

# Research Agenda * Part1 - porting the backdoor for windows (READY) * Part2 - porting the backdoor...

image

Elevation of privilege (EoP) with Token stealing Overview

Post exploitation is a vital step in every cyberattack and black hat hacking operation. Post-exploit...

image

Footprints of Mailgun Phishing Campaigns

# Introduction Recently Mailgun security team published an [article](https://www.mailgun.com/blog/c...

image

Covert DNS C&C for Red teaming Ops

# DNS-Attacks ## introduction DNS is one of the core services of the current Internet. It is used...