Secer - 主页
Articles
登录
Sign In
Sign Up
文章
first
…
74
75
76
77
78
…
last
304
So, you won a regional and you’re headed to National CCDC
cobaltstrike
214
User-defined Storage-based Covert Communication
cobaltstrike
199
Indecent (Penetration Testing) Proposal
cobaltstrike
261
Cobalt Strike 2.3 – I’ve always wanted runas
cobaltstrike
230
How I tunnel Meterpreter through Beacon
cobaltstrike
208
DNS Communication is a Gimmick
cobaltstrike
186
Another Night, Another Actor
cobaltstrike
224
My Favorite PowerShell Post-Exploitation Tools
cobaltstrike
254
Scripting Beacons and Deploying Persistence
cobaltstrike
239
My Constraint-based Product Strategy
cobaltstrike
255
When You Know Your Enemy
cobaltstrike
235
Audiences… or who I think I’m writing for
cobaltstrike
274
What’s the go-to phishing technique or exploit?
cobaltstrike
225
Course Review: Dark Side Ops
cobaltstrike
241
How did your hacking-style change in 2014?
cobaltstrike
206
Pass-the-(Golden)-Ticket with WMIC
cobaltstrike
339
The Best DerbyCon 2014 Talks for Red Teams
cobaltstrike
334
How VPN Pivoting Works (with Source Code)
cobaltstrike
221
Map of Cobalt Strike Features for Armitage Users
cobaltstrike
293
Give me any zero-day and I will rule the world
cobaltstrike
220
Interactive Cortana Programming
cobaltstrike
281
Adversary Simulation Becomes a Thing…
cobaltstrike
241
Cobalt Strike 2.2 – 1995 called, it wants its covert channel back…
cobaltstrike
215
That was a fun fire drill…
cobaltstrike
284
Evolution of a Modern Hacking Payload
cobaltstrike
236
Why can’t I psexec with EXE::Custom?
cobaltstrike
275
Infrastructure for Ongoing Red Team Operations
cobaltstrike
213
The Post Exploitation Team
cobaltstrike
215
Cobalt Strike 2.1 – I have the POWER(shell)
cobaltstrike
213
User-driven Attacks
cobaltstrike
232
The Access Management Team [Shell Sherpas]
cobaltstrike
239
HTTP Proxy Authentication for Malware
cobaltstrike
239
Cobalt Strike 2.0 – Malleable Command and Control
cobaltstrike
232
Use Cobalt Strike’s Beacon with Veil’s Evasion
cobaltstrike
322
Pass-the-Golden-Ticket with Cobalt Strike’s Beacon
cobaltstrike
280
Introducing Morning Catch – A Phishing Paradise
cobaltstrike
223
Puttering my Panda and other Threat Replication Case Studies
cobaltstrike
252
Cobalt Strike 1.49 – HTTP Proxy Authentication? No Problem.
cobaltstrike
214
Covert Lateral Movement with High-Latency C&C
cobaltstrike
229
The #1 Trait of a Successful Hacker
cobaltstrike
247
Meterpreter Kiwi Extension: Golden Ticket HOWTO
cobaltstrike
230
Connecting to a Metasploit RPC server on Windows is not supported
cobaltstrike
202
The Beachhead
cobaltstrike
290
Cobalt Strike – Innovative Offense or “just a GUI”?
cobaltstrike
196
CCDC Red Teams: Ten Tips to Maximize Success
cobaltstrike
213
Cobalt Strike 03.13.14 – NECCDC Edition
cobaltstrike
339
User Account Control – What Penetration Testers Should Know
cobaltstrike
218
Listeners: Cobalt Strike’s Glue Feature
cobaltstrike
198
What happens when I type getsystem?
cobaltstrike
180
Survival Skills for Small Infosec Vendors
cobaltstrike
first
…
74
75
76
77
78
…
last
Hacking more
...
#attack #hack