Blog
Home / Blog

Havoc C2 Framework
Havoc C2 Framework August 30, 2023 Red Team Shashikant Prasad Havoc C2 has quickly become one of many peoples’ favorite open-source C2s. Its features offer

Key Principles of a Zero-Trust Cybersecurity Framework
Key Principles of a Zero-Trust Cybersecurity Framework August 24, 2023 Informational Atharva Nanche Cyber security has become critical to organizations worldwide as cyber threats grow

Exploiting Misconfigured Active Directory Certificate Template – ESC1
Exploiting Misconfigured Active Directory Certificate Template – ESC1 August 19, 2023 Active Directory Kunal Kumar Certificates are crucial in establishing trust and securing communication within

Understanding Intent Injection Vulnerabilities in Android Apps
Understanding Intent Injection Vulnerabilities in Android Apps August 16, 2023 API Tarak Sakhardande In the complex world of Android app security, intent injection vulnerabilities pose

GPO Abuse
GPO Abuse July 31, 2023 Active Directory Kunal Kumar Group Policy Objects (GPOs) are a powerful tool administrators use to manage and enforce security policies

Introduction to C2 Frameworks
Introduction to C2 Frameworks July 27, 2023 Red Team Shashikant Prasad Command and Control (C2) frameworks have emerged as a sophisticated and consequential dimension in

Abusing ACL Misconfigurations
Abusing ACL Misconfigurations July 25, 2023 Active Directory Karan Patel Access Control Lists (ACLs) are a crucial component of securing data and resources in an

Discovering Internet Accessible Devices with Shodan
Discovering Internet Accessible Devices with Shodan July 24, 2023 OSINT Siddharth Johri In the vast landscape of the internet, a hidden world of devices is

The Importance of Vulnerability Scans and Pen Testing
The Importance of Vulnerability Scans and Pen Testing July 22, 2023 Informational Avinash Sahani As cyber-attacks have evolved, businesses must protect their applications against vulnerabilities

Power of Covenant C2 Framework
Power of Covenant C2 Framework July 22, 2023 Red Team Kunal Kumar In the ever-evolving world of cybersecurity, staying one step ahead of malicious actors

DOM-Based Cross-Site Scripting
DOM-Based Cross-Site Scripting July 21, 2023 Web Application Tarak Sakhardande As the digital landscape continues to evolve, so do the threats that target web applications.

Defending Against Phishing Attacks
Defending Against Phishing Attacks July 21, 2023 Informational Avinash Sahani As technology continues to advance, so do the tactics of cybercriminals. Phishing attacks trick individuals