PinnedFantastic IIS Modules and How to Find ThemInternet Information Services (IIS) is a commonly used web server produced by Microsoft to assist organizations of all sizes to host…Feb 9, 2023Feb 9, 2023
CVE-2025–3248 Exploitation Attempt Caught Red-Handed: Real Attack Analysis from HoneyHarborEditor’s Note: This attack was captured during testing of HoneyHarbor, our upcoming open-source honeypot deployment platform designed to…Jun 20Jun 20
🚀 ClickGrab Major Update: Python Migration & Enhanced Threat Intelligence PlatformWe’re thrilled to announce a massive update to ClickGrab that transforms our threat intelligence platform into a more powerful…Jun 18Jun 18
Published inmagicswordioAnnouncing LOLRMM: A Unified Approach to RMM Software Trackinglolrmm.ioSep 30, 2024Sep 30, 2024
The Crucial Role of Proof of Concept (POC) in Detection EngineeringThis is an AI generated piece, reviewed for accuracy by humans.Mar 18, 2024Mar 18, 2024
Published inmagicswordioLOLDrivers and HVCIFriends, we meet again for another behind-the-scenes look at the LOLDrivers project. Lurking in our backlog for some time was the…Dec 22, 2023Dec 22, 2023
Deploy, Test, Monitor: Mastering Microsoft Defender ASR with Atomic Techniques in SplunkAdversaries constantly seek new methods to breach endpoint security, making it essential to minimize potential points of attack, vigilantly…Dec 13, 2023Dec 13, 2023
Fancy NTLM RelayIn today’s episode of #RabbitHoleWednesday, I stumbled upon this tweet —Sep 6, 2023Sep 6, 2023