Secer - 主页
Articles
登录
Sign In
Sign Up
文章
first
…
74
75
76
77
78
…
last
332
So, you won a regional and you’re headed to National CCDC
cobaltstrike
240
User-defined Storage-based Covert Communication
cobaltstrike
229
Indecent (Penetration Testing) Proposal
cobaltstrike
293
Cobalt Strike 2.3 – I’ve always wanted runas
cobaltstrike
262
How I tunnel Meterpreter through Beacon
cobaltstrike
234
DNS Communication is a Gimmick
cobaltstrike
219
Another Night, Another Actor
cobaltstrike
257
My Favorite PowerShell Post-Exploitation Tools
cobaltstrike
287
Scripting Beacons and Deploying Persistence
cobaltstrike
271
My Constraint-based Product Strategy
cobaltstrike
279
When You Know Your Enemy
cobaltstrike
269
Audiences… or who I think I’m writing for
cobaltstrike
306
What’s the go-to phishing technique or exploit?
cobaltstrike
279
Course Review: Dark Side Ops
cobaltstrike
273
How did your hacking-style change in 2014?
cobaltstrike
234
Pass-the-(Golden)-Ticket with WMIC
cobaltstrike
373
The Best DerbyCon 2014 Talks for Red Teams
cobaltstrike
366
How VPN Pivoting Works (with Source Code)
cobaltstrike
254
Map of Cobalt Strike Features for Armitage Users
cobaltstrike
330
Give me any zero-day and I will rule the world
cobaltstrike
248
Interactive Cortana Programming
cobaltstrike
313
Adversary Simulation Becomes a Thing…
cobaltstrike
268
Cobalt Strike 2.2 – 1995 called, it wants its covert channel back…
cobaltstrike
243
That was a fun fire drill…
cobaltstrike
315
Evolution of a Modern Hacking Payload
cobaltstrike
265
Why can’t I psexec with EXE::Custom?
cobaltstrike
304
Infrastructure for Ongoing Red Team Operations
cobaltstrike
243
The Post Exploitation Team
cobaltstrike
241
Cobalt Strike 2.1 – I have the POWER(shell)
cobaltstrike
237
User-driven Attacks
cobaltstrike
271
The Access Management Team [Shell Sherpas]
cobaltstrike
269
HTTP Proxy Authentication for Malware
cobaltstrike
268
Cobalt Strike 2.0 – Malleable Command and Control
cobaltstrike
260
Use Cobalt Strike’s Beacon with Veil’s Evasion
cobaltstrike
362
Pass-the-Golden-Ticket with Cobalt Strike’s Beacon
cobaltstrike
309
Introducing Morning Catch – A Phishing Paradise
cobaltstrike
252
Puttering my Panda and other Threat Replication Case Studies
cobaltstrike
283
Cobalt Strike 1.49 – HTTP Proxy Authentication? No Problem.
cobaltstrike
246
Covert Lateral Movement with High-Latency C&C
cobaltstrike
260
The #1 Trait of a Successful Hacker
cobaltstrike
277
Meterpreter Kiwi Extension: Golden Ticket HOWTO
cobaltstrike
264
Connecting to a Metasploit RPC server on Windows is not supported
cobaltstrike
235
The Beachhead
cobaltstrike
323
Cobalt Strike – Innovative Offense or “just a GUI”?
cobaltstrike
228
CCDC Red Teams: Ten Tips to Maximize Success
cobaltstrike
241
Cobalt Strike 03.13.14 – NECCDC Edition
cobaltstrike
388
User Account Control – What Penetration Testers Should Know
cobaltstrike
251
Listeners: Cobalt Strike’s Glue Feature
cobaltstrike
234
What happens when I type getsystem?
cobaltstrike
207
Survival Skills for Small Infosec Vendors
cobaltstrike
first
…
74
75
76
77
78
…
last
Hacking more
...
#attack #hack