How I hacked 100 hackers… Or script kiddies I could sayNov 12, 2024A response icon11Nov 12, 2024A response icon11
BSides Transylvania Is Not A Simple Conference, Is a Training Ground For Your Security TeamAs a leader in the IT industry, you know how critical it is to have a skilled and constantly evolving cybersecurity team. In today’s…Mar 8, 2024Mar 8, 2024
What to expect from BSides Transylvania 2024Yes, we are doing a security conference this year in Romania, BSides Transylvania! Yes, we are “all-in” to make it one of the best.Jan 31, 2024Jan 31, 2024
Bypass Canary Tokens for Monitored CommandsThrough this article, we will explore a simple but creative method to bypass the Canary Tokens that are configured to alert when a specific…Apr 2, 2023Apr 2, 2023
Bypass Windows DefenderIn this article, we will bypass Windows Defender (the latest version), explaining each step in detail.Jul 28, 2022A response icon5Jul 28, 2022A response icon5
How to Bypass 2FA/MFA with PhishingIn this article, we will discuss how you can bypass Multi-Factor Authentication (MFA) in a Phishing attack, to takeover accounts.Jul 20, 2022A response icon1Jul 20, 2022A response icon1
BadUSB 101In this article, we will discuss BadUSB, how to program it, and some offensive tricks of delivering it.Jun 2, 2022A response icon2Jun 2, 2022A response icon2
Methods to Exploit HTML InjectionIn this article, we will discuss the HTML Injection vulnerability, and 3 methods of how to creatively leverage it for exploitation.May 18, 2022A response icon3May 18, 2022A response icon3
Tips for Offensive Security Experienced Penetration Tester (OSEP) CertificationThis exam makes OSCP seem ridiculously easy.Apr 15, 2022A response icon2Apr 15, 2022A response icon2