Phishing with Modlishka!
Hello everyone! Today, I will discuss a tool called Modlishka, a reverse proxy that proves useful in phishing during red team engagements. I won't delve into the setup details for…
Hello everyone! Today, I will discuss a tool called Modlishka, a reverse proxy that proves useful in phishing during red team engagements. I won't delve into the setup details for…
Hey Guyz! I am writing this blog with respect to my recent project TokenStealer, which can help to steal the access token of a user when an attacker has local…
Hey folks! Today I am going to explain the working of cobalt strike executes assembly, and how it executes managed code through unmanaged Windows API. So, let's begin! What…
Hey Guys, hope you all are doing well! After so long, I decided to write blogs about Active Directory attacks and their detections through Windows Events. This is my first…
Hey Guys! In the previous blog, we touched on the basics of blockchain, transactions, etc. In this blog, we are going to see the basics of Ethereum and will move…
Hey Guyz! I am starting a series on Blockchain, where I will be writing about blockchain, Ethereum, solidity, smart contract audit, and their security implications, etc. In this part, I…