Published onJune 5, 2024The Anatomy of a Social Engineering AttackphishingCTIemail-analysisphishing-linkfacebookhacksocial-engineeringreal-worldA breakdown of how social engineering attacks are carried out, from the initial research phase to the execution and exit strategies.Read more →
Published onMay 15, 2024Windows Password/Login Screen Bypassbackdoorread-teamhackingwindows-password-bypasslogin-screenhackingtechniquesbypassHow to Bypass windows password.Read more →
Published onMay 3, 2024Pakistan Prime Minister's Office Themed Phishing PDF File Evaded All the AV SolutionsAVred-teamMITREmalicious-pdfPakistanprime-ministeriocbreachMy insights on suspicious file detection that targeted Pakistan PM Office.Read more →
Published onApril 14, 2024Trace IP InformationIPtrackinformationms-wordlocate-personhackingtechniquesTrack IP address and location of person by sending simple word or other files.Read more →
Published onMarch 15, 2024Hide Backdoors in Scheduled Tasksbackdoorread-teamhackingred-team-tipsscheduled-taskshackingtechniquestipsTip to hide backdoor in Scheduled Tasks.Read more →