red-team-tools
Bloodhound Enterprise: securing Active Directory using graph theory
BloodHound Enterprise: securing Active Directory using graphsPrior to my employment at SpecterOps, I hadn’t worked in the information security industry- as a result, many security related terms and concepts that were tossed around ...
COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT
Shouty name—dangerous game. Red-team tool ripe for misuse ...
Mythic 2.3 — An Interface Reborn
Mythic 2.3 — An Interface RebornNew Mythic SearchMythic started off as a proof of concept, open source project in 2018 with a small follow-on blog series for the process and the rationale of the various ...