A little while ago I came across a particularly difficult environment with strong Windows Defender Application Control (WDAC) policies configured and no way ...| cerbersec.com
I receive the questions “I want to become a red teamer” or “How do I get started in pentesting / red teaming?” pretty often. Instead of repeating myself, I’l...| cerbersec.com
Back in April 2021, I did an internship at NVISO. I was part of one of their Red Teams and tasked with developing custom Beacon Object Files for the Cobalt S...| cerbersec.com
In this post I will go over the basics of Domain Borrowing and how DomainBorrowingC2 was built. DomainBorrowingC2 was made as part of an internship at NVISO ...| cerbersec.com
Today I’m taking a look at different packers used to pack malware, how to identify them and how to unpack them.| cerbersec.com
THIS POST IS A WORK IN PROGRESSIn this post I’ll go over writing a basic Hello World program in C, using MinGW to compile, assemble and link it. I’ll be look...| cerbersec.com
Today I take a look at the Buffer Overflows Made Easy course by The Cyber Mentor.| cerbersec.com
Gophish is an opensource phishing framework which focuses on: automating email distribution using groups, email generation by using templates, importing and ...| cerbersec.com
AI| cerbersec.com
Back in April 2021, I did an internship at NVISO. I was part of one of their Red Teams and tasked with developing custom Beacon Object Files for the Cobalt S...| cerbersec.com