10-28
Dissecting the Gremlin Infostealer
#malware-analysis #reversing
10-20
Taking a look at the Leprechaun Loader
#malware-analysis #reversing
07-08
Attack Mapping with Bloodhound
#bloodhound #postexp
06-21
Abusing Active Directory Certificate Services
#adcs #ESC1