This post will walk through various services within the Azure catalogue and look at potential attack paths.
A deep dive into specifics around cobalt strike malleable c2 profiles and key information that is new in cobalt strike 4.6
HoneyPoC was a project to look at how popular CVE PoCs could be. AutoPoC took that concept and enabled the mass creation of disinformation. Also, Data is beautiful.
Working with ADExplorer as a Red Teamer is really useful for seeing the whole domain in a single snapshot that can be looked at offline. There is minimal tooling out there for parsing
A little guide for locking down a VPS or similar to ensure your SSH connection is as secure as can be.