Homepage
Sign inGet started

Posts by SpecterOps Team Members

Know Your Adversary

  • About
  • All Posts
  • specterops.io
  • Latest Posts
    Go to the profile of Matt Graeber
    Matt Graeber
    Dec 22

    Code Signing Certificate Cloning Attacks and Defenses

    Read more…
    Go to the profile of Roberto Rodriguez
    Roberto Rodriguez
    Dec 15

    Ready to hunt? First, Show me your data!

    Nowadays, Threat Hunting is a very popular topic among not just security practitioners in…

    Read more…
    Go to the profile of Jeff Dimmock
    Jeff Dimmock
    Dec 4

    Designing Effective Covert Red Team Attack Infrastructure

    Read more…
    Go to the profile of Matt Graeber
    Matt Graeber
    Nov 27

    Adventures in Extremely Strict Device Guard Policy Configuration Part 1 — Device Drivers

    Read more…
    Go to the profile of Will
    Will
    Nov 20

    The PowerView PowerUsage Series #4

    This is a short follow-up to my “A Guide to Attacking Domain Trusts” post, and the fourth post in my “PowerView PowerUsage” series. It follows the same Scenario/Solution/Explanation pattern as the previous entries, with the original post containing a constantly updated…

    Read more…
    Go to the profile of Matt Nelson
    Matt Nelson
    Nov 16

    Lateral Movement Using Outlook’s CreateObject Method and DotNetToJScript

    Read more…
    1 response
    Go to the profile of Matt Nelson
    Matt Nelson
    Nov 6

    A Look at CVE-2017–8715: Bypassing CVE-2017–0218 using PowerShell Module Manifests

    Read more…
    About Posts By SpecterOps Team MembersLatest StoriesArchiveAbout MediumTermsPrivacy