Phishing: Redressing Microsoft COM Objects

This post will describe how to overcome an embedded Office COM object from looking less than enticing and making it more phish friendly, such as a clickable button.…

Kali Rolling and PowerShell Core

This post provides a resolution to an issue preventing Microsoft Powershell Core from installing on Kali Rolling.…

Attacking Azure Developers: Easy Mode

This post provides various tactics for hunting Microsoft Azure credentials within a DevOps environment. Topics include environment variables, PowerShell AzureRM and the Secret Manager utility.…

Code Survival: Debug a Compiled DLL

An introduction to using VS2017, DotPeek and ILSpy in order to debug and step-through a compiled DLL.…