BYOVD Attacks Explained
BYOVD, (short for Bring Your Own Vulnerable Driver) is a strategy where attackers use legitimately signed but exploitable drivers to gain privileged access to systems. In this comprehensive guide, BYOVD is explained...
Read More5 Reverse Engineering Tools For Cyber Security
Reverse engineering is one of those skills that is required ofr red team / blue team ops, malware analysis, exploit development, and defensive research. The tooling ecosystem is massive, but a handful...
Read MoreTop 5 LOLBins Every Red Teamer Should Know
Living-off-the-land binaries (LOLbins) are native Windows executables that perform legitimate administrative functions. Because they are signed, widely deployed, and trusted by enterprise tooling, they are used by Red Teams and Threat Actors...
Read More10 Windows Commands Every Red Teamer Should Know
This post is going to cover 10 Windows commands for red teamers that are less likely to trigger alerts or look suspicious. Unlike most of the recycled “hacking commands” lists filled with...
Read More