



Domain Categorization
Domain categorization can help keep an organization’s users productive and help users avoid browsing malicious websites. However, new defense mechanisms are developed, attackers learn new ways to bypass such defenses.




HTA Attacks
HTA’s are often used by attackers to deliver malware to victims. Today we will walk through how to create our own HTA that allows us to run arbitrary commands on a Windows host.

Creating Malicious Macros
Macros are used to automate Microsoft Office tasks. Malicious macros are commonly leveraged by adversaries to execute client-side attacks. This post will walk you through how to create your own Macro to run arbitrary commands.

How To Get Started With Mythic C2 Framework
How to get started with the Mythic C2 framework an awesome tool for modern red teams.


How To Get Started With o365 Phishing Simulation Training For Free
Learn how to get started using Microsoft o365 phishing simulation training for free!







Growing Pains
This past year has been a cycle of challenging myself, falling flat on my face, and learning so much.
