PowerHub- A Post Exploitation Suite To Bypass Endpoint Protection
PowerHub is a convenient post exploitation tool which aids a pentester in transferring files, in particular code which may get flagged by endpoint protection.
During an engageme…
More results...
PowerHub- A Post Exploitation Suite To Bypass Endpoint Protection
PowerHub is a convenient post exploitation tool which aids a pentester in transferring files, in particular code which may get flagged by endpoint protection.
During an engageme…
Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap Aimed at Red Teams.
With limited physical access to a target building, this tap can be installed inline between a network device and the corporate network.
PhanTap is silent in the network an…
The Black Hat USA keynote encourages better collaboration and a more positive culture
LokiBot is getting stealthier and is now hiding its devastating payload in image files.
Forget wardriving; warshipping is a more targeted way to hit a company’s wireless network, says IBM.
LeapFrog’s Pet Chat app was leaking children’s location, say researchers.
Why the world needs to empower technologists
Now Politicians and boards know cybersecurity, what do we do with the attention?
DoJ indicts man who allegedly paid staff hundreds of thousands
Symantec report reveals app adoption is outpacing security efforts