Secer - 主页
Articles
登录
Sign In
Sign Up
文章
first
…
74
75
76
77
78
…
last
195
So, you won a regional and you’re headed to National CCDC
cobaltstrike
127
User-defined Storage-based Covert Communication
cobaltstrike
111
Indecent (Penetration Testing) Proposal
cobaltstrike
176
Cobalt Strike 2.3 – I’ve always wanted runas
cobaltstrike
127
How I tunnel Meterpreter through Beacon
cobaltstrike
127
DNS Communication is a Gimmick
cobaltstrike
124
Another Night, Another Actor
cobaltstrike
133
My Favorite PowerShell Post-Exploitation Tools
cobaltstrike
163
Scripting Beacons and Deploying Persistence
cobaltstrike
131
My Constraint-based Product Strategy
cobaltstrike
141
When You Know Your Enemy
cobaltstrike
135
Audiences… or who I think I’m writing for
cobaltstrike
176
What’s the go-to phishing technique or exploit?
cobaltstrike
146
Course Review: Dark Side Ops
cobaltstrike
144
How did your hacking-style change in 2014?
cobaltstrike
121
Pass-the-(Golden)-Ticket with WMIC
cobaltstrike
212
The Best DerbyCon 2014 Talks for Red Teams
cobaltstrike
241
How VPN Pivoting Works (with Source Code)
cobaltstrike
128
Map of Cobalt Strike Features for Armitage Users
cobaltstrike
192
Give me any zero-day and I will rule the world
cobaltstrike
129
Interactive Cortana Programming
cobaltstrike
166
Adversary Simulation Becomes a Thing…
cobaltstrike
155
Cobalt Strike 2.2 – 1995 called, it wants its covert channel back…
cobaltstrike
122
That was a fun fire drill…
cobaltstrike
188
Evolution of a Modern Hacking Payload
cobaltstrike
145
Why can’t I psexec with EXE::Custom?
cobaltstrike
189
Infrastructure for Ongoing Red Team Operations
cobaltstrike
123
The Post Exploitation Team
cobaltstrike
125
Cobalt Strike 2.1 – I have the POWER(shell)
cobaltstrike
129
User-driven Attacks
cobaltstrike
132
The Access Management Team [Shell Sherpas]
cobaltstrike
138
HTTP Proxy Authentication for Malware
cobaltstrike
143
Cobalt Strike 2.0 – Malleable Command and Control
cobaltstrike
141
Use Cobalt Strike’s Beacon with Veil’s Evasion
cobaltstrike
220
Pass-the-Golden-Ticket with Cobalt Strike’s Beacon
cobaltstrike
196
Introducing Morning Catch – A Phishing Paradise
cobaltstrike
137
Puttering my Panda and other Threat Replication Case Studies
cobaltstrike
162
Cobalt Strike 1.49 – HTTP Proxy Authentication? No Problem.
cobaltstrike
126
Covert Lateral Movement with High-Latency C&C
cobaltstrike
132
The #1 Trait of a Successful Hacker
cobaltstrike
154
Meterpreter Kiwi Extension: Golden Ticket HOWTO
cobaltstrike
135
Connecting to a Metasploit RPC server on Windows is not supported
cobaltstrike
110
The Beachhead
cobaltstrike
189
Cobalt Strike – Innovative Offense or “just a GUI”?
cobaltstrike
140
CCDC Red Teams: Ten Tips to Maximize Success
cobaltstrike
124
Cobalt Strike 03.13.14 – NECCDC Edition
cobaltstrike
188
User Account Control – What Penetration Testers Should Know
cobaltstrike
122
Listeners: Cobalt Strike’s Glue Feature
cobaltstrike
109
What happens when I type getsystem?
cobaltstrike
98
Survival Skills for Small Infosec Vendors
cobaltstrike
first
…
74
75
76
77
78
…
last
Hacking more
...
#attack #hack