WMI Event Subscriptions: Techniques and Defenses

7/9/2025

What is Windows Management Instrumentation (WMI) Event Subscriptions and how to abuse it and how to secure your stuff.

How ransomware operators operate

5/2/2025

Learn how Ransomware operators execute their attacks with surgical precision, leveraging Active Directory, Kerberos, and domain controllers.

Covert Data Exfiltration via DNS Tunneling

4/12/2025

In-depth exploration of DNS tunneling and practical use cases for covert data transmission.

Tracking using Wi-Fi Triangulation

4/12/2025

Wi-Fi Triangulation for Geolocation on Windows Using netsh and Unwired Labs API.