How to build a disposable attack box using a Raspberry Pi
A Raspberry Pi. Two red teamers. One mission: hack grandma
2
HTTP Request Smuggling in NodeJS
1
A deep dive into adversary profiles and how you can build them
A friendly guide to tactics, techniques, and especially, procedures
1
Our Vision For A New Kind Of Security Company
4
A few things up front before getting into the meat of the content. First off, a writer I am not; I neither guarantee grammatical perfection nor am I…
1
How autonomy is plotting to upend the offensive security space
2
15
A day-in-the-life of a purple teamer using Prelude Operator
The security industry focuses the vast preponderance of its time, resources, and intellectual capital on designing advanced tools only accessible to…
and
2
From Caldera to Operator and the milestones in between
One of the most common questions about Operator I receive is: How do I access Windows APIs in C# (or C++) instead of using shell commands? Red and…