BSides Transylvania Is Not A Simple Conference, Is a Training Ground For Your Security TeamAs a leader in the IT industry, you know how critical it is to have a skilled and constantly evolving cybersecurity team. In today’s…Mar 8Mar 8
What to expect from BSides Transylvania 2024Yes, we are doing a security conference this year in Romania, BSides Transylvania! Yes, we are “all-in” to make it one of the best.Jan 31Jan 31
Bypass Canary Tokens for Monitored CommandsThrough this article, we will explore a simple but creative method to bypass the Canary Tokens that are configured to alert when a specific…Apr 2, 2023Apr 2, 2023
Bypass Windows DefenderIn this article, we will bypass Windows Defender (the latest version), explaining each step in detail.Jul 28, 20225Jul 28, 20225
How to Bypass 2FA/MFA with PhishingIn this article, we will discuss how you can bypass Multi-Factor Authentication (MFA) in a Phishing attack, to takeover accounts.Jul 20, 20221Jul 20, 20221
BadUSB 101In this article, we will discuss BadUSB, how to program it, and some offensive tricks of delivering it.Jun 2, 20222Jun 2, 20222
Methods to Exploit HTML InjectionIn this article, we will discuss the HTML Injection vulnerability, and 3 methods of how to creatively leverage it for exploitation.May 18, 20223May 18, 20223
Tips for Offensive Security Experienced Penetration Tester (OSEP) CertificationThis exam makes OSCP seem ridiculously easy.Apr 15, 20222Apr 15, 20222
Top 25 Subdomain Takeover Bug Bounty ReportsIn this article, we will discuss the Subdomain Takeover attack, and present 25 disclosed reports based on this flaw.Mar 15, 20221Mar 15, 20221