Accessing Alternate Data Streams on VMDK Images on Linux.
Tag: malware
REVIEW: Malware Data Science – Attack Detection and Attribution
Review of Malware Data Science: Attack Detection and Attribution
REVIEW: RED TEAM Operator: Windows Persistence Course by SEKTOR7 Institute
My review of SEKTOR7 Institute's Red Team Operator, Windows Persistence course.
REVIEW: RED TEAM Operator: Malware Development Essentials Course by SEKTOR7 Institute
Review of RED TEAM Operator: Malware Development Essentials Course by SEKTOR7 Institute.
My Never-ending Quest to Break Gscript
I was victimized by gscript at a CTF. Here is how I dealt with it.
Building a Hardened Shell For Attack/Defend CTF Supremacy
Harden bash shells against pesky red teamers.