| | Backdoors and Breaches, an incident response card game (blackhillsinfosec.com) |
|
24 points by inhumantsar 11 months ago | past
|
| | Backdoors and Breaches, an Incident Response Card Game (blackhillsinfosec.com) |
|
1 point by thinkmassive on Jan 24, 2024 | past | 1 comment
|
| | Real Time Threat Detection for Kubernetes with Atomic Red Tests and Falco (blackhillsinfosec.com) |
|
2 points by jojodoi on Jan 5, 2024 | past
|
| | How to weaponize the Yubikey (2019) (blackhillsinfosec.com) |
|
168 points by popcalc on Feb 24, 2023 | past | 20 comments
|
| | How to Weaponize the Yubikey (2019) (blackhillsinfosec.com) |
|
2 points by softwarebeware on Feb 11, 2022 | past
|
| | Let's Talk About TikTok (blackhillsinfosec.com) |
|
2 points by albuwab on July 24, 2020 | past
|
| | Dungeons and Dragons, Meet Cubicles and Compromises (2017) (blackhillsinfosec.com) |
|
1 point by pwinnski on Sept 9, 2019 | past
|
| | Google Calendar Event Injection with MailSniper (2017) (blackhillsinfosec.com) |
|
117 points by andrewaylett on Aug 27, 2019 | past | 70 comments
|
| | How to Weaponize the Yubikey (blackhillsinfosec.com) |
|
3 points by amingilani on May 3, 2019 | past
|
| | The RDP Through SSH Encyclopedia (blackhillsinfosec.com) |
|
1 point by lainon on Feb 28, 2019 | past
|
| | Getting PowerShell Empire Past Windows Defender (blackhillsinfosec.com) |
|
1 point by wolframio on Feb 19, 2019 | past
|
| | SSHazam: Hide Your C2 Inside of SSH (blackhillsinfosec.com) |
|
2 points by lainon on Jan 8, 2019 | past
|
| | Embedding Meterpreter in Android APK (blackhillsinfosec.com) |
|
1 point by lainon on Oct 15, 2018 | past
|
| | How I Cracked a 128-bit Password (blackhillsinfosec.com) |
|
2 points by lainon on Oct 4, 2018 | past
|
| | Having Fun with ActiveX Controls in Microsoft Word (blackhillsinfosec.com) |
|
1 point by rbanffy on Aug 30, 2018 | past | 1 comment
|
| | Stealing 2FA Tokens with CredSniper (blackhillsinfosec.com) |
|
1 point by agrinman on Aug 24, 2018 | past
|
| | G Suite Is the Soft Underbelly of Your Environment (blackhillsinfosec.com) |
|
1 point by DyslexicAtheist on July 19, 2018 | past
|
| | How to Build a Password Cracker with NVidia GTX (blackhillsinfosec.com) |
|
3 points by gyre007 on June 26, 2018 | past
|
| | Malware Command and Control Using Google Drive (blackhillsinfosec.com) |
|
1 point by dakotanelson on Sept 2, 2016 | past
|
| | Bypass Application Whitelisting to Run Powershell (blackhillsinfosec.com) |
|
1 point by dakotanelson on Sept 2, 2016 | past
|