With this blog post my goal is not to raise awareness, but to provide people with a tool that they can use to defend themselves from attacks when technological measures fail or are not properly configured as well as analog scams or other fraudulent attempts. I’ve also come to the conclusion that maybe it’s not so much about what you know about attacks, but how you FEEL when being attacked, that can make the difference between becoming a victim or not.
Some random thoughts / ramblings on physical security stuff. Mostly intended as a memo to self on a variety of possibilities.
Hi,
Recently, I was working on an article on Medium platform about WiFi penetration testing using the tool Freeway.
It's completely free to read, and takes only 10 minutes of your time, while you can surely learn a lot, whether you are beginner or a professional.
Any feedback is greatly appreciated.
Troll .NET library to bypass x64 UAC
Hey hackers! RomHack 2024 Call for Papers closes on May 31, if you plan to present your awesome research in Rome 🇮🇹 make sure to submit before that date!
See you in Rome 🍕🍝🍷!
A walkthrough of using Ghidra to produce a GDB script for tracing function calls.
Hi, came here for some feedback and to share the tool with other red teamers.
Every opinion is very welcome.
The Freeway features: - Network monitor - Deauth attack - Beacon Flood - Packet Fuzzer - Network Audit - Channel Hopper
A Post-Compromise granular, fully reflective, simple and convenient .NET library to embed persistency to persistency by abusing Security Descriptors of remote machines. The techniques incorporated are not novel but I've yet to come across any documented approach of modifying SCM/Service's SDDL by directly modifying registry keys. Modification of SD for WMI and Remote registry was also added in as an after thought but this means there's a lot more to explore and add for the curious minds.
A Post-Compromise granular, fully reflective, simple and convenient .NET library to embed persistency to persistency by abusing Security Descriptors of remote machines. The techniques incorporated are not novel but I've yet to come across any documented approach of modifying SCM/Service's SDDL by directly modifying registry keys. Modification of SD for WMI and Remote registry was also added in as an after thought but this means there's a lot more to explore and add for the curious minds.