Offensive Security

lateral-movement
Other Tags in this Category

FEATURED

Feature Your Cybersecurity Product

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Boost Your Visibility

NEW

An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.

A post-exploitation framework designed to operate covertly on heavily monitored environments.

A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement

A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.