Kali and BC Security Partnership
Background In November, Kali announced a new program for supporting tool developers, which kicked off with sponsoring Byt3Bl33d3r. We are
Read moreTutorials
Background In November, Kali announced a new program for supporting tool developers, which kicked off with sponsoring Byt3Bl33d3r. We are
Read moreA tutorial explaining a workaround fix for KDE plasma / NVIDIA crashing to a black background and no taskbar in Kubuntu with an external monitor.
Read moreCome and read the step by step walkthrough guide to Delivery on Hack The Box.
We start with a nmap scan to see what ports are available…
Read moreA list of commands that can be used to test API keys that are found in Bug Bounty engagements.
Read moreWTF is a canary token I hear some of you ask? Well, they are pretty nifty little things. If that
Read moreHack The Box Walkthrough Guide to: ID Exposed using Google and OSINT
Read moreI have been recently been using Integromat.com for some automation and integration work. IF you are wondering what it is,
Read moreStart with a nmap scan, then we want to open burp suite and navigate to…
Read moreEDIT: Now unlocked for all as the machine has been retired. Disclaimer: I do NOT want you to read this
Read moreDo you love using Tilix, but found that the latest version of Kali Linux doesn’t seem to support installing it
Read moreI start up the machine then always start with a quick Nmap and the follow it up with a more intense one shortly after. I highlight things that look interesting and may warrant further investigation.
Read moreI am going to assume you have already got your NAS working, with a working install of WatchTower.Once that is
Read moreThe new Empire CLI is out and includes some big changes to the user experience. We rebuilt the CLI to
Read moreIts been about 2-weeks since we released Empire 3.4, and hopefully, everyone has had a chance to check out all
Read moreEmpire 3.4.0 is our next major release and is packed with one of the most advanced features to-date, Malleable C2.
Read moreWhile giving our talk at the DEF CON Red Team Village a couple of weeks ago, I previewed a PowerShell
Read moreOver the weekend, we were setting up a virtual range for our upcoming class this weekend and was testing a mail server.
Read moreLast month we taught our DEF CON 27 workshop, Introduction to Sandbox Evasion and AMSI Bypasses, as a webinar. It
Read moreAnthony Rose | Jake Krasnov As part of the update to Empire that we pushed out today, the OneDrive listener
Read moreVincent Rose | Jacob Krasnov | Anthony Rose Today we are excited to announce the release of Starkiller! Our multi-user
Read moreJacob Krasnov | Anthony Rose This blog is going to be the first entry in a series that goes over
Read moreIntroduction Reverse engineering of Android applications is usually considered as somewhat effortless because of the possibility of retrieving the Java
Read morePart 1: Detailed overview of Samsung’s TrustZone components Part 2: Tools development for reverse-engineering and vulnerability research Part 3: Vulnerability
Read moreAs you may have read in our previous blog post, the release of Triton v0.8 came with a lot of
Read more