Posts by Tag

Red Teaming

From traditional to templated malware

7 minute read

This is a follow-up article to Introducing Blueprint which was released to accompany our malware templating tool, Blueprint. The goal of this article is to p...

Introducing Blueprint

6 minute read

As discussed in our previous post, regarding Fairplay, during Red Team engagements a lot of focus is shifted into preserving and protecting the malware. Fair...

Back to Top ↑

Exploitation

Symbolicating stripped ELF files manually

3 minute read

Let’s face the truth, debugging and pwning stripped ELFs is a tedious process. The lack of symbols means that we need to type a lot of addresses manually, wh...

URLs are dangerous!

8 minute read

Freaking finally. It was about time! The first technical security post around here, and to be honest, the first post in a long time. I won’t bore you with a ...

Back to Top ↑

Pwning

Symbolicating stripped ELF files manually

3 minute read

Let’s face the truth, debugging and pwning stripped ELFs is a tedious process. The lack of symbols means that we need to type a lot of addresses manually, wh...

Back to Top ↑

Tool

Introducing Blueprint

6 minute read

As discussed in our previous post, regarding Fairplay, during Red Team engagements a lot of focus is shifted into preserving and protecting the malware. Fair...

Back to Top ↑

Metaprogramming

From traditional to templated malware

7 minute read

This is a follow-up article to Introducing Blueprint which was released to accompany our malware templating tool, Blueprint. The goal of this article is to p...

Introducing Blueprint

6 minute read

As discussed in our previous post, regarding Fairplay, during Red Team engagements a lot of focus is shifted into preserving and protecting the malware. Fair...

Back to Top ↑

Templating

From traditional to templated malware

7 minute read

This is a follow-up article to Introducing Blueprint which was released to accompany our malware templating tool, Blueprint. The goal of this article is to p...

Introducing Blueprint

6 minute read

As discussed in our previous post, regarding Fairplay, during Red Team engagements a lot of focus is shifted into preserving and protecting the malware. Fair...

Back to Top ↑

Apache Camel

URLs are dangerous!

8 minute read

Freaking finally. It was about time! The first technical security post around here, and to be honest, the first post in a long time. I won’t bore you with a ...

Back to Top ↑

Web Application Cybersecurity Testing

URLs are dangerous!

8 minute read

Freaking finally. It was about time! The first technical security post around here, and to be honest, the first post in a long time. I won’t bore you with a ...

Back to Top ↑

Research

URLs are dangerous!

8 minute read

Freaking finally. It was about time! The first technical security post around here, and to be honest, the first post in a long time. I won’t bore you with a ...

Back to Top ↑

Unix

Symbolicating stripped ELF files manually

3 minute read

Let’s face the truth, debugging and pwning stripped ELFs is a tedious process. The lack of symbols means that we need to type a lot of addresses manually, wh...

Back to Top ↑

Reverse Engineering

Symbolicating stripped ELF files manually

3 minute read

Let’s face the truth, debugging and pwning stripped ELFs is a tedious process. The lack of symbols means that we need to type a lot of addresses manually, wh...

Back to Top ↑

Artifact Monitoring

Back to Top ↑

Malware Development

From traditional to templated malware

7 minute read

This is a follow-up article to Introducing Blueprint which was released to accompany our malware templating tool, Blueprint. The goal of this article is to p...

Back to Top ↑

Windows

Back to Top ↑