Recent Posts

T1592.001

Gather Victim Host Information: Hardware

T1580

Cloud Infrastructure Discovery

T1574.011

Hijack Execution Flow: Services Registry Permissions Weakness

T1574.009

Hijack Execution Flow: Path Interception by Unquoted Path