Fox-headed hacker in red hoodie with glowing fox emblem kneels in a neon-lit server room, symbolizing Havoc C2 framework.

Havoc C2 Framework

Havoc C2 has quickly become one of many peoples’ favorite open-source C2s. Its features offer everything you need to complete a pen test or red

Read More »
Fox-hooded figure managing multiple servers and monitors, representing command and control (C2) frameworks in cybersecurity.

Introduction to C2 Frameworks

Command and Control (C2) frameworks have emerged as a sophisticated and consequential dimension in the ever-evolving cybersecurity landscape. These frameworks are commonly employed by threat

Read More »
Windows UAC Bypass

Windows UAC Bypass

What is UAC? UAC (User Account Control) is a windows security feature that forces any new process to run in non-elevated mode by default. Any

Read More »
Antivirus Evasion (Part 1)

Antivirus Evasion (Part 1)

Antivirus Evasion in general use signature-based and heuristics-based malware detection mechanisms. In this blog, we will learn and test some techniques to try and bypass

Read More »