How Interview Cheating Tools Hide from Zoom
Interview Coder has been making waves on my X timeline. The tool promises to quietly deliver AI-generated answers for coding interview questions, evading the screen capture feed your interviewer uses …
Interview Coder has been making waves on my X timeline. The tool promises to quietly deliver AI-generated answers for coding interview questions, evading the screen capture feed your interviewer uses …
I gave a talk for OzSec 2022 about Endpoint Detection and Response software – discussing the architecture, design & common bypass techniques at the time. Unfortunately, the talk was not …
This blog post was made possible by the fantastic work and research done by @commail which you can read here. Background Recently I was presented with a scenario where I wanted to dump lsass.exe on a …
Cracking hashes with the power of cloud compute is nothing new and there have been several methods to accomplish this over the years. Recently I’ve been toying around with Vast.ai as a …
In Cobalt Strike 4.4, Sleep Mask Kit was released to help operators customize the encryption algorithm used to obfuscate the data and strings within beacon’s memory. By default it uses a 13-byte …
During red team engagements, we frequently encounter EDR solutions. We deploy a lot of Cobalt Strike, and I wanted to write up a short blog post on how you can quickly deploy a beacon (or your own …