
Malware on Steroids Part 3: Machine Learning & Sandbox Evasion
Hey, It’s been a busy month for me and I was not able to save time to write the final […]
Hey, It’s been a busy month for me and I was not able to save time to write the final […]
Recap In the previous post, we wrote a simple CMD Reverse Shell over TCP. However, in a real-life scenario, things […]
The Prologue This is my reposting of the blog series I wrote here at ScriptDotSh If you haven’t watched the […]
by Bhushan Shah, NII Consulting The index.dat is a file which contains the list of the websites that one has […]
Securing your passwords against Rainbow Table Attacks By Bhushan Shah, NII Consulting In the previous article we looked at the […]
By Chetan Gupta, NII Consulting In my previous article on Userassist, I had mentioned how UserAssist records user access of […]
Penetration Testing Fyodor’s back with his top 100 security tools for 2006. One of the most significant, but not surprising, […]
By Chetan Gupta, NII Consulting A supposedly nightmarish tool for the investigator community! Recently this tool was released at the […]