PinnedCurtis BrazzellA Practical, AI-Generated Phishing PoC With ChatGPTIntroApr 17, 2023Apr 17, 2023
Curtis BrazzellA Konami Code for Vuln Chaining CombosAutomate finding relational vulnerabilities for a more accurate risk ratingNov 5, 20212Nov 5, 20212
Curtis BrazzellYou ain’t got no problem, Jules. I’m on the Multifactor.Practical Bypasses for MFA with Poor ImplementationsJul 9, 2021Jul 9, 2021
Curtis BrazzellMy KringleCon 2020 HolidayHack WriteupAnother Amazing Year of Challenges!Jan 12, 2021Jan 12, 2021
Curtis BrazzellPhishing Your Password ManagerDiscovering and Exploiting a Common FlawSep 25, 20201Sep 25, 20201
Curtis BrazzellOne Part Steganography, Four Redirectors, and a Splash of C2!Using QR Codes and Image Proxies for C2 TrafficSep 20, 2020Sep 20, 2020
Curtis BrazzellThese Aren’t the Phish You’re Looking ForAn Effective Technique for Avoiding BlacklistsMay 25, 20202May 25, 20202