Pythonic Malware Part-2: Reversing Python Executables
Post Updates 09/2023: Starting in PyInstaller 6, bytecode encryption and the --key argument have been depreciated. Overview In Pythonic Malware Part-1, I demonstrated how Python executables ...
Post Updates 09/2023: Starting in PyInstaller 6, bytecode encryption and the --key argument have been depreciated. Overview In Pythonic Malware Part-1, I demonstrated how Python executables ...
Creating Python executables during an offensive security engagement used to be an effective method of evasion. However, this tactic has become increasingly difficult on modern Windows endpoints. I...
To date, one of my most lucrative bug bounties came from a password reset poisoning vulnerability. This post walks through the process of finding, exploiting, and fixing this bug to help you earn a...
Metadata is simply defined as data about data. In computer systems, this is used to correctly interpret files and store descriptive attributes. While not always visible, metadata provides far more ...
This post introduces the concept of information disclosure through NTLM authentication and demonstrates methods for invoking an NTLM challenge response over HTTP(S) - even when no login page is pre...