A Konami Code for Vuln Chaining CombosAutomate finding relational vulnerabilities for a more accurate risk ratingNov 5, 2021A response icon2Nov 5, 2021A response icon2
You ain’t got no problem, Jules. I’m on the Multifactor.Practical Bypasses for MFA with Poor ImplementationsJul 9, 2021Jul 9, 2021
Phishing Your Password ManagerDiscovering and Exploiting a Common FlawSep 25, 2020A response icon1Sep 25, 2020A response icon1
One Part Steganography, Four Redirectors, and a Splash of C2!Using QR Codes and Image Proxies for C2 TrafficSep 20, 2020Sep 20, 2020
These Aren’t the Phish You’re Looking ForAn Effective Technique for Avoiding BlacklistsMay 25, 2020A response icon2May 25, 2020A response icon2