Phishing: Redressing Microsoft COM Objects
This post will describe how to overcome an embedded Office COM object from looking less than enticing and making it more phish friendly, such as a clickable button.…
This post will describe how to overcome an embedded Office COM object from looking less than enticing and making it more phish friendly, such as a clickable button.…
This post provides a resolution to an issue preventing Microsoft Powershell Core from installing on Kali Rolling.…
This post provides various tactics for hunting Microsoft Azure credentials within a DevOps environment. Topics include environment variables, PowerShell AzureRM and the Secret Manager utility.…
An introduction to using VS2017, DotPeek and ILSpy in order to debug and step-through a compiled DLL.…