Persistence, Exfiltration, and Extortion
Use this tool to scale your automated security inside your organization
Downloaders, packers, and wipers - oh my!
How to use a command-and-control center for security testing
A tutorial on running an API-first command and control center
The final release for our APT40 Theme
A look at APT40 defence evasion techniques
0verture: The Prelude Podcast CVE-EP12Listen now | with special guest Jonathan Couch
Gaining a foothold via the Oasis Chain
Emulating APT40's malware persistence techniques
0verture: The Prelude Podcast CVE-EP11Listen now | Welcome to our eleventh episode of 0verture: The Prelude Podcast! This week Alex and Kris have special guest Stephan on the podcast to…
, , and
Stage and execute malicious multi-stage Office documents