Advertisement · 728 × 90

Posts by freefirex

Preview
Abusing Windows Built-in VPN Providers

In our new blog, Research Practice Lead Christopher Paschen walks us through how to modify the system routing table when connecting to a virtual private network (VPN) with basic, user-level access. Read it now! trustedsec.com/blog/abusing...

1 year ago 0 1 0 0

This tool took quite a bit of research and will be growing over time. Really allows exploring dit files and also includes credential extraction features :)

Alex will be doing quite a bit of public facing research and tool releases, give him a follow to stay tuned!

1 year ago 2 0 0 0

Present @honeybadgerhax.bsky.social succeeds ;)

1 year ago 1 0 1 0