Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.
Boost Your VisibilityAn exploration of a new method to abuse DCOM for remote payload execution and lateral movement.
A post-exploitation framework designed to operate covertly on heavily monitored environments.
A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement
A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.