PinnedPublished inDataDrivenInvestorCreate Lightweight Agentic AI ToolsLearn how to create a hybrid agent workflow that uses LLMs to perform actions on your behalf with guard railsJan 22Jan 22
Published inSystem WeaknessPacking Binaries with GoLearn how to create your own custom encryption and compression based packer for linux binariesAug 18, 2024Aug 18, 2024
Published inSystem WeaknessKeyboard Logging in Go with WebhooksLearn to create a global keylogger in Windows using raw WinAPIsAug 18, 2024Aug 18, 2024
Published inSystem WeaknessCost Effective Data Exposure Detection and Response AutomationLearn how to use public web APIs, Tines SOAR, and Canary Tokens to bolster your insider threat program.Sep 7, 2023Sep 7, 2023
Published inSystem WeaknessRed Team Polymorphic Engine in PythonLearn how to create a simple polymorphic generator for red team payloads in Python to bypass anti-malware detections.Apr 4, 20232Apr 4, 20232
Published inSystem WeaknessMulti-Threaded Hash Cracking in GoLearn how to utilize Go to perform basic dictionary cracking utilizing single and multi-threaded techniques.Apr 1, 2023Apr 1, 2023
Published inSystem WeaknessCovert Data Exfil with GCP and GoLearn how to bypass Data Loss Prevention (DLP) solutions steaming binary files to GCP Cloud Logging using Go.Mar 28, 20231Mar 28, 20231
Published inDataDrivenInvestorThreat Informed Defense with AWS Lambda and VirusTotalLearn how to create a lightweight antivirus alternative selectively inspecting suspicious S3 objects in Lambda with Python and VirusTotalMar 19, 2023Mar 19, 2023
Published inScaleSecRed Team Payload with Go and GCPLearn how to create C2 payload with GCP Storage buckets and GoLangDec 5, 2022Dec 5, 2022
Published inScaleSecRefactoring by Example for Security EngineersLearn how to refactor a stand alone threat detection bash script to a container and RESTful based solution.Oct 6, 2022Oct 6, 2022