Depending on the customer’s preference, possible initial access vectors in our red teaming exercises typically include deployment of dropboxes,…

Read more

TL;DR: PowerShell tool to enumerate Entra ID objects, assignments and identify highly privileged objects or risky configurations.…

Read more

As a pentester you are sometimes thrown into projects where you have no idea where you are going to end up. This project was one of those where you…

Read more

Red Team Operator. A hype-tagged role tag for which one question hits our corporate LinkedIn inbox very often. “Hey there, how can I become a Red Team…

Read more

In the previous posts of this series, we looked at different ways to bypass web filters, such as Host header spoofing and domain fronting. As we’ve…

Read more