A Konami Code for Vuln Chaining CombosAutomate finding relational vulnerabilities for a more accurate risk ratingNov 5, 20212Nov 5, 20212
You ain’t got no problem, Jules. I’m on the Multifactor.Practical Bypasses for MFA with Poor ImplementationsJul 9, 2021Jul 9, 2021
One Part Steganography, Four Redirectors, and a Splash of C2!Using QR Codes and Image Proxies for C2 TrafficSep 20, 2020Sep 20, 2020
These Aren’t the Phish You’re Looking ForAn Effective Technique for Avoiding BlacklistsMay 25, 20202May 25, 20202