Secer - 主页
Articles
登录
Sign In
Sign Up
文章
first
…
74
75
76
77
78
…
last
324
So, you won a regional and you’re headed to National CCDC
cobaltstrike
231
User-defined Storage-based Covert Communication
cobaltstrike
220
Indecent (Penetration Testing) Proposal
cobaltstrike
282
Cobalt Strike 2.3 – I’ve always wanted runas
cobaltstrike
252
How I tunnel Meterpreter through Beacon
cobaltstrike
224
DNS Communication is a Gimmick
cobaltstrike
210
Another Night, Another Actor
cobaltstrike
244
My Favorite PowerShell Post-Exploitation Tools
cobaltstrike
275
Scripting Beacons and Deploying Persistence
cobaltstrike
260
My Constraint-based Product Strategy
cobaltstrike
272
When You Know Your Enemy
cobaltstrike
258
Audiences… or who I think I’m writing for
cobaltstrike
292
What’s the go-to phishing technique or exploit?
cobaltstrike
242
Course Review: Dark Side Ops
cobaltstrike
261
How did your hacking-style change in 2014?
cobaltstrike
224
Pass-the-(Golden)-Ticket with WMIC
cobaltstrike
361
The Best DerbyCon 2014 Talks for Red Teams
cobaltstrike
353
How VPN Pivoting Works (with Source Code)
cobaltstrike
239
Map of Cobalt Strike Features for Armitage Users
cobaltstrike
316
Give me any zero-day and I will rule the world
cobaltstrike
237
Interactive Cortana Programming
cobaltstrike
302
Adversary Simulation Becomes a Thing…
cobaltstrike
258
Cobalt Strike 2.2 – 1995 called, it wants its covert channel back…
cobaltstrike
233
That was a fun fire drill…
cobaltstrike
306
Evolution of a Modern Hacking Payload
cobaltstrike
255
Why can’t I psexec with EXE::Custom?
cobaltstrike
292
Infrastructure for Ongoing Red Team Operations
cobaltstrike
232
The Post Exploitation Team
cobaltstrike
233
Cobalt Strike 2.1 – I have the POWER(shell)
cobaltstrike
229
User-driven Attacks
cobaltstrike
260
The Access Management Team [Shell Sherpas]
cobaltstrike
259
HTTP Proxy Authentication for Malware
cobaltstrike
260
Cobalt Strike 2.0 – Malleable Command and Control
cobaltstrike
248
Use Cobalt Strike’s Beacon with Veil’s Evasion
cobaltstrike
346
Pass-the-Golden-Ticket with Cobalt Strike’s Beacon
cobaltstrike
297
Introducing Morning Catch – A Phishing Paradise
cobaltstrike
241
Puttering my Panda and other Threat Replication Case Studies
cobaltstrike
272
Cobalt Strike 1.49 – HTTP Proxy Authentication? No Problem.
cobaltstrike
236
Covert Lateral Movement with High-Latency C&C
cobaltstrike
250
The #1 Trait of a Successful Hacker
cobaltstrike
268
Meterpreter Kiwi Extension: Golden Ticket HOWTO
cobaltstrike
251
Connecting to a Metasploit RPC server on Windows is not supported
cobaltstrike
221
The Beachhead
cobaltstrike
311
Cobalt Strike – Innovative Offense or “just a GUI”?
cobaltstrike
218
CCDC Red Teams: Ten Tips to Maximize Success
cobaltstrike
231
Cobalt Strike 03.13.14 – NECCDC Edition
cobaltstrike
370
User Account Control – What Penetration Testers Should Know
cobaltstrike
240
Listeners: Cobalt Strike’s Glue Feature
cobaltstrike
222
What happens when I type getsystem?
cobaltstrike
198
Survival Skills for Small Infosec Vendors
cobaltstrike
first
…
74
75
76
77
78
…
last
Hacking more
...
#attack #hack