Category: Offensive

0

Kali Linux :: Email Harvesting

In this post, I will show you a tool in Kali Linux that’s able to harvest email addresses that are publicly available on the internet. Why do I want to harvest emails? When working...

0

Bug Hunting – PHP

I’ve been doing a bit of bug hunting recently (with varying degrees of success) and really wanted to write this article just so I have a little cheat sheet to go back to!  I’ll...

2

USB HID attack – A zero to hero guide

I’ve had a Teensy USB 3.2 Arduino board for around a year now with the intention of playing with some USB HID attacks and creating this blog has finally motivated me to do it.  Hurrah...

PowerShell ISE logo 2

PowerShell :: a macro malware sender

Hopefully you have landed here having read Part I and Part II of my How to make your own macro malware series and already have a little context behind this script.  In short, it came...

Encrypted Document 1

How to make your own macro malware – Part II

Hi, Hopefully you have arrived here having read the part one of this guide which walks you through developing a strategy and those all important macro embedded documents.  If not, you can find the...