- The difference between signature-based and behavioural detections https://s3cur3th1ssh1t.github.io/Signature_vs_Behaviour/ 3 comments netsec
- On how to access (protected) networks https://s3cur3th1ssh1t.github.io/on-how-to-access-protected-networks/ 2 comments netsec
- Named Pipe Pass-the-Hash https://s3cur3th1ssh1t.github.io/named-pipe-pth/ 2 comments netsec
- The most common on premise vulnerabilities & misconfigurations https://s3cur3th1ssh1t.github.io/the-most-common-on-premise-vulnerabilities-and-misconfigurations/ 24 comments netsec
- A tale of EDR bypass methods https://s3cur3th1ssh1t.github.io/a-tale-of-edr-bypass-methods/ 18 comments netsec
- Bypass Windows protection mechanisms & Playing with OffensiveNim https://s3cur3th1ssh1t.github.io/playing-with-offensivenim/ 5 comments netsec
- Excel-Phish - Phish protected Excel-file passwords https://s3cur3th1ssh1t.github.io/phish-password-protected-excel-files/ 6 comments netsec