Featured Blog

OSINT Your Target With Custom Recon-NG Modules

This is gonna be a quick post on a cool project I’ve been working on. The project was to create a python program that, when given a company name, does the following


Mor Davidovich

Execute any "evil" Powershell code by bypassing AMSI

Powershell can be a powerful tool during the post-exploitation phase of our engagements. But what if AMSI will not let us use any of its capabilities?


Mor Davidovich

1 2

Get informed of the latest news in cyber security

Enter your email address to receive cyber security tips, techniques, and updates

powered by nextbracket.io