Detailing the Attack Surfaces of the WolfBox E40 EV Charger
December 03, 2024 | Dmitry Janushkevich CONTINUE READINGBlog post
Exploiting Exchange PowerShell After ProxyNotShell: Part 4 – No Argument Constructor
- September 26, 2024
Blog post
Exploiting Exchange PowerShell After ProxyNotShell: Part 3 – DLL Loading Chain for RCE
- September 19, 2024
Blog post
Exploiting Exchange PowerShell After ProxyNotShell: Part 2 - ApprovedApplicationCollection
- September 12, 2024
Blog post
Exploiting Exchange PowerShell After ProxyNotShell: Part 1 - MultiValuedProperty
- September 05, 2024
Blog post
,Archive
Abusing Arbitrary File Deletes to Escalate Privilege and Other Great Tricks (Archive)
- September 03, 2024
Blog post
CVE-2024-37079: VMware vCenter Server Integer Underflow Code Execution Vulnerability
- August 28, 2024
Blog post
Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 3
- August 01, 2024