PinnedFantastic IIS Modules and How to Find ThemInternet Information Services (IIS) is a commonly used web server produced by Microsoft to assist organizations of all sizes to host…Feb 9, 2023Feb 9, 2023
Published inmagicswordioAnnouncing LOLRMM: A Unified Approach to RMM Software Trackinglolrmm.ioSep 30Sep 30
The Crucial Role of Proof of Concept (POC) in Detection EngineeringThis is an AI generated piece, reviewed for accuracy by humans.Mar 18Mar 18
Published inmagicswordioLOLDrivers and HVCIFriends, we meet again for another behind-the-scenes look at the LOLDrivers project. Lurking in our backlog for some time was the…Dec 22, 2023Dec 22, 2023
Deploy, Test, Monitor: Mastering Microsoft Defender ASR with Atomic Techniques in SplunkAdversaries constantly seek new methods to breach endpoint security, making it essential to minimize potential points of attack, vigilantly…Dec 13, 2023Dec 13, 2023
Fancy NTLM RelayIn today’s episode of #RabbitHoleWednesday, I stumbled upon this tweet —Sep 6, 2023Sep 6, 2023
Published inmagicswordioUnmasking Malicious Bootloaders with Bootloaders.ioIn the intricate battleground of cybersecurity, the defense against malicious bootloaders, or bootkits, has always been a relentless game…Aug 3, 2023Aug 3, 2023
Published inmagicswordioLOLDrivers 2.0: Pioneering ProgressIntroducing LOLDrivers 2.0: A significant milestone that refines the user experience and expands upon our comprehensive threat detection…Jul 31, 2023Jul 31, 2023