Resources

Blog
The #1 Trait of a Successful Hacker
For some people, programming comes naturally to them. For others, it’s a struggle or something that doesn’t click with the way they think. The same
Blog
Man-in-the-Browser Session Hijacking
Malware like Zeus and its variants inject themselves into a user’s browser to steal banking information. This is a man-in-the-browser attack. So-called, because the attacker
Blog
Cobalt Strike 1.48 – Peer-to-peer C&C
I’m pleased to announce Cobalt Strike 1.48. This release introduces a peer-to-peer data channel for Beacon, improves browser pivoting, and updates the signed applet attack with