Advertisement · 728 × 90

Posts by Andréw Hüang

1 year ago 0 0 0 0
Preview
Targeting the cybercrime supply chain Microsoft’s Digital Crimes Unit (DCU) has seized 256 fraudulent websites linked to ‘MRxC0DER’, who sold phishing kits under the brand names ‘ONNX’ and ‘Caffeine’. This takedown disrupts a significant ...

Microsoft's legal team seizes 256 domains used by the ONNX phishing service

blogs.microsoft.com/on-the-issue...

1 year ago 9 3 0 0
Preview
Obfuscating API Patches to Bypass New Windows Defender Behavior Signatures Introduction I’ve got a short post today based on some recent changes by Windows Defender. Over the weekend, I noticed that some of my unit tests began failing on code that had not been recen…
1 year ago 2 1 0 0
Preview
New AMSI Bypss Technique Modifying CLR.DLL in Memory Introduction Recently, Microsoft has rolled out memory scanning signatures to detect manipulation of security critical userland APIs such as AMSI.dll::AmsiScanBuffer. You can read about the details…

Check out this new AMSI bypass released with SpectersInsight 4.0.0! This technique enables loading of .NET binaries without detection. Implementations in C, C#, and PowerShell provided.

practicalsecurityanalytics.com/new-amsi-byp...

1 year ago 0 1 0 0
Preview
GitHub - nccgroup/ScoutSuite: Multi-Cloud Security Auditing Tool Multi-Cloud Security Auditing Tool. Contribute to nccgroup/ScoutSuite development by creating an account on GitHub.


Tools
Cloud Auditing Tool - github.com/nccgroup/ScoutSuite

Post-Exploitation toolset
github.com/dafthack/GraphRunner

Find gaps within Azure MFA requirements.
github.com/absolomb/FindMeAccess

BloodHound github.com/BloodHoundAD/AzureHound

Azure AD hacking & admin
github.com/Gerenios/AADInternals

1 year ago 4 2 1 0
A photograph of the keyboard from an ADM-3A terminal. Arrows can be seen on the H, J, K, and L keys; left, down, up, and right arrows respectively

A photograph of the keyboard from an ADM-3A terminal. Arrows can be seen on the H, J, K, and L keys; left, down, up, and right arrows respectively

If you ever wondered why vi uses h, j, k, and l for cursor movement: it's because it was written using an ADM-3A terminal, which had a keyboard that looked like this

1 year ago 107 28 7 2

Hello World!

1 year ago 2 0 1 0
Advertisement