
The Art of Windows Persistence(EBook)
This technical summary provides an overview of various Windows persistence methods, highlighting their mechanisms and potential use in cybersecurity, both for offensive and defensive purposes. Account Creation Startup Methods File and System Manipulation Scheduled Tasks Services and DLL Manipulation Advanced Techniques COM Manipulation Accessibility Features Network and System Tools WMI, Active Setup, and IFEO Time-Based and Visual Triggers Local Security Authority (LSA) Development and Version Control
The Art of Windows Persistence(EBook)
This technical summary provides an overview of various Windows persistence methods, highlighting their mechanisms and potential use in cybersecurity, both for offensive and defensive purposes.
Threat Intel Roundup: ownCloud, APT-Q-36, AlfaC2, ActionRunner
Week in Overview(21 Nov-28 Nov) it is crucial for organizations and individuals to prioritize remediation and patching efforts to safeguard their systems and data. The
Shellcode Development (EBook)
User Account Control bypass techniques that allow malware to operate stealthily and resist detection and removal efforts. The key findings highlight the innovative and diverse
Threat Intel Roundup: Splunk, D0nut, DarkGate, SentinelAgent
Week in Overview(14 Nov-21 Nov) it is crucial for organizations and individuals to prioritize remediation and patching efforts to safeguard their systems and data. The
The Art of Windows Persistence(EBook)
This technical summary provides an overview of various Windows persistence methods, highlighting their mechanisms and potential use in cybersecurity, both for offensive and defensive purposes.
Threat Intel Roundup: ownCloud, APT-Q-36, AlfaC2, ActionRunner
Week in Overview(21 Nov-28 Nov) it is crucial for organizations and individuals to prioritize remediation and patching efforts to safeguard their systems and data. The
Shellcode Development (EBook)
User Account Control bypass techniques that allow malware to operate stealthily and resist detection and removal efforts. The key findings highlight the innovative and diverse
Threat Intel Roundup: Splunk, D0nut, DarkGate, SentinelAgent
Week in Overview(14 Nov-21 Nov) it is crucial for organizations and individuals to prioritize remediation and patching efforts to safeguard their systems and data. The

SAST
Expose secrets, misconfigurations, code mistake, and data breaches before they happen

E-Learning
interactive digital courseware designed to help development teams learn and implement best practices for secure coding

RASP
It's designed to detect and block attacks on applications in real time

Pwn ZO
Endpoint protection delivered as-a-service and backed with breach prevention warranty up to $1M
Hadess Red Team Operation
Flexible and Extensible
Each module below is available on the red team operation platform and its implemented via a single endpoint
Initial Access

PENETRATION TESTING
Endpoint Detection & Response

PRIVILEGE ESCALATION
Extended Detection & Response

SOCIAL ENGINEERING
Integrated Identify Security
Lateral Movement

DISCOVERY
Vulnerability Assessment

story2
story1
…