Hacking

MalDev - Execute PE From PNG Via LNK

Research on the extracting and executing a PE embedded within a PNG file using an LNK file.

Privilege Escalation Series 2: lambda functions

Part 2 of the Privilege Escalation Series. This time exploiting a Lambda Function and granting Admin Access

Exploit Exchange, Teams and SharePoint with GraphRunner

Azure Hacking Series: Lost MS365 Credentials can be way worse than you may think!

AMSI Bypass alias AMSI Write Raid Vulnerability

Testing Offsec Research to bypass AMSI without using the VirtualProtect API and without changing memory protection

Smells like honey - like honey token

An short description on how to create and use an honey token