Recent Posts

Introducing Office 365 Attack Toolkit

During our red team operations, we frequently come in contact with organisations using Office 365. The present tooling targeted at this environment is somewh...

A journey on APT34 PoisonFrog C2 Server

In the recent years APTs have been the center of infosec. Mainly because of the public coverage by the media, glorifying by security companies and many more ...

Bypassing AppLocker Custom Rules

Introduction Applocker is becoming one of the most implemented security features in big organizations. Implementing AppLocker reduces your risk dramatically ...