Browser Debugging Abuse — Google ChromeHave you ever suddenly found that all you browser history have disappeared? It could a sign of compromise, where a threat actor with…Oct 16Oct 16
How to make an Infected USB DeviceYou may have seen those movies, where an agent connects a USB device to a system, and it automatically start to infect the system. HOW ARE…May 9May 9
Is it possible to attack a private network?Yes. As we know a router works in layer 3 of OSI-model. It only knows what is in layer 3 and below, such as IP, Port and MAC address, that…Nov 4, 2020Nov 4, 2020
Developing custom shellcode in x64By now we know that most of the shellcodes generated by metasploit can be detected by any antivirus.Feb 25, 2020A response icon1Feb 25, 2020A response icon1