Bloodhound Enterprise: securing Active Directory using graph theory

Bloodhound Enterprise: securing Active Directory using graph theory

BloodHound Enterprise: securing Active Directory using graphsPrior to my employment at SpecterOps, I hadn’t worked in the information security industry- as a result, many security related terms and concepts that were tossed around ...
Mythic 2.3 — An Interface Reborn

Mythic 2.3 — An Interface Reborn

| | mythic, red-team-tools
Mythic 2.3 — An Interface RebornNew Mythic SearchMythic started off as a proof of concept, open source project in 2018 with a small follow-on blog series for the process and the rationale of the various ...