
Why Hunting For LOLBINs Is One Of The Best Bets by Nasreddine Bencherchali Introduction While working on “Malicious Command-Line”(MAL-CL), documenting and researching the many use cases different tools can be (ab)used via the command line. I noticed a trend that in hindsight seems “obviously obvious” but is I believe worth....
Author

Latest Articles
OfficialFebruary 22, 2023Windows Privilege Escalation: The Concepts of Hijacking Execution Flow
OfficialFebruary 22, 2023Building Intuition into Monitoring for OT/ICS Security
OfficialFebruary 22, 2023WiFi Pentesting with Airodump-ng
OfficialFebruary 21, 2023ETW vs Sysmon Against C2 Servers
Subscribe
Login
0 Comments