WMI Event Subscriptions: Techniques and Defenses
7/9/2025
What is Windows Management Instrumentation (WMI) Event Subscriptions and how to abuse it and how to secure your stuff.
How ransomware operators operate
5/2/2025
Learn how Ransomware operators execute their attacks with surgical precision, leveraging Active Directory, Kerberos, and domain controllers.
Covert Data Exfiltration via DNS Tunneling
4/12/2025
In-depth exploration of DNS tunneling and practical use cases for covert data transmission.
Tracking using Wi-Fi Triangulation
4/12/2025
Wi-Fi Triangulation for Geolocation on Windows Using netsh and Unwired Labs API.