This post will walk through various services within the Azure catalogue and look at potential attack paths.
A deep dive into specifics around cobalt strike malleable c2 profiles and key information that is new in cobalt strike 4.6
Exploiting Petit Potam in a different way to force some downgrade and protocol attacks.
One thing that comes up a lot when it comes to red teaming, penetration testing and breaching a network is being able to proxy traffic into multiple environments.
HoneyPoC was a project to look at how popular CVE PoCs could be. AutoPoC took that concept and enabled the mass creation of disinformation. Also, Data is beautiful.