During the few days, I wanted to make an excel 4 macro that can run on any office architecture and operating system. I did a bit of search, but I could not find any work done by others. So I decided to write my own. It was a bit of »

During the last engagement, I faced a situation where the currently existed phishing tools were not enough; therefore, I started to code my own. Initially, I had a few requirements. I wanted the phishing tool to: Send attachments in emails.Encrypt the attachment with a passwordSend that password in the »

In this post, I am going to demonstrate a new bypass on the Carbon Black solutions with the maximum security enforcement and configuration as well as all the Threat Intelligence feeds are enabled in the CB Response. Environment Settings Running Products: Carbon Black Protection – (Application control)Carbon Black Defense – (NGAV) »