News
Cyber intelligence and OSINT as part of corpo...
The imperative need for an excellent level of corporate security/cybersecurity in any type of company is something that, today, is indisputable. All organizations try to i...
Cyber intelligence and OSINT as part of corpo...
The imperative need for an excellent level of corporate security/cybersecurity in any type of company is something that, today, is indisputable. All organizations try to i...
How to bypass AMSI using DLL Hijacking
Very good to everyone! Today we come with one last installment (for now) about the world of AMSI. On this occasion, we are going to discover how we could evade...
How to bypass AMSI using DLL Hijacking
Very good to everyone! Today we come with one last installment (for now) about the world of AMSI. On this occasion, we are going to discover how we could evade...
OPSEC, critical and sensitive information prote...
That information (both personal and corporate) is power is nothing new. Furthermore, with it (whether it is used well or poorly) very profitable businesses can be generated, even...
OPSEC, critical and sensitive information prote...
That information (both personal and corporate) is power is nothing new. Furthermore, with it (whether it is used well or poorly) very profitable businesses can be generated, even...
Ligolo-ng, advanced pivoting of the Go hand
Very good, during this installment we will talk about a tool that makes the topic of tunnels much easier. Don't get lost in it! . Ligolo-ng is a simple, light...
Ligolo-ng, advanced pivoting of the Go hand
Very good, during this installment we will talk about a tool that makes the topic of tunnels much easier. Don't get lost in it! . Ligolo-ng is a simple, light...
Security in the software life cycle
The use of applications, services, infrastructures and software services, or based on software, is something that is the order of the day and that we do several hundred times every...
Security in the software life cycle
The use of applications, services, infrastructures and software services, or based on software, is something that is the order of the day and that we do several hundred times every...
Obfuscation techniques for AMSI
Very good to everyone. In this post we are going to talk about how antivirus (AV) detect malicious scripts at runtime and the measures to obfuscate scripts in Powershell and...
Obfuscation techniques for AMSI
Very good to everyone. In this post we are going to talk about how antivirus (AV) detect malicious scripts at runtime and the measures to obfuscate scripts in Powershell and...