Top Categories

Spotlight

todayMay 7, 2024

Cyber Security Hubbl3

Survivorship Bias and How Red Teams Can Handle It

Reporting is, by nature, only the threat actors that have been caught. What about all the ones that didn’t get caught? There is no way to examine that and It comes down to the fact that we don’t know what they did and therein lies the problem for threat emulation.


Cyber Security

23 Results / Page 2 of 3

Background

todayNovember 3, 2021

  • 3628
  • 13
close

Cyber Security + Offensive Security Tools Cx01N

Empire 4.2

Empire 4.2 was just finalized over the weekend and we are excited to share some of the new features. This version has added some new capabilities to keep our threat emulation capabilities in line with current adversary TTPs. We have added a brand new IronPython stager, which can be compiled ...

todayOctober 4, 2021

  • 503
  • 3
close

Cyber Security Cx01N

Hacktoberfest 2021

It’s that time of year again! This means it’s the season for Halloween, Oktoberfest, and HACKTOBERFEST! So what is Hacktoberfest? Hacktoberfest is a yearly event that encourages participation in the open-source community. The best part is if you participate by contributing to open source projects, you receive a limited edition ...

todayJuly 14, 2021

  • 6943
  • 6
close

Cyber Security Hubbl3

XLS Entanglement

VBA tradecraft is constantly evolving and this past winter, I came across some articles from Adepts of 0xCC. Specifically, their article Hacking in an Epistolary Way: Implementing Kerberoast in Pure VBA caught my attention and I wanted to try and see if it would be possible to create a pure ...

todaySeptember 7, 2020

  • 4916
  • 4
close

Offensive Security Tools + Cyber Security Cx01N

Empire: Malleable C2 Profiles

Empire 3.4.0 is our next major release and is packed with one of the most advanced features to-date, Malleable C2. The Malleable C2 Listener gives control to operators to customize their beacons to match specific threats. It does this through profiles, which are simple scripts that instruct the listener how ...