HTA Attacks
HTA’s are often used by attackers to deliver malware to victims. Today we will walk through how to create our own HTA that allows us to run arbitrary commands on a Windows host.
Creating Malicious Macros
Macros are used to automate Microsoft Office tasks. Malicious macros are commonly leveraged by adversaries to execute client-side attacks. This post will walk you through how to create your own Macro to run arbitrary commands.
How To Get Started With Mythic C2 Framework
How to get started with the Mythic C2 framework an awesome tool for modern red teams.
How To Get Started With o365 Phishing Simulation Training For Free
Learn how to get started using Microsoft o365 phishing simulation training for free!