• Trends
  • Topics
  • Nodes
Search for keywords, #hashtags, $sites, add a dash to exclude, e.g. -$theonion.com

From lorenzomeacci.com

Advanced Initial Access Techniques | Lorenzo Meacci

0 0

In this blog post, I will teach you the methodology and techniques adversaries use to compromise systems. I will showcase the payload development process and its delivery—both remote and physical.

on Feb 27

From lorenzomeacci.com

The Havoc framework | Lorenzo Meacci

0 1

In this blog post, I will demonstrate how to use the Havoc framework and develop Beacon Object Files (BOFs).

on Feb 15