top of page
Profile
Join date: Nov 14, 2024
Posts (2)
Jul 25, 2023 ∙ 5 min
Playing with Bubbles: An Introduction to DLL-Sideloading
DLL Side-Loading is a pervasive technique partially because its behavior is difficult to detect. As a sub-technique of DLL Hijacking, it ta
3817
0
Jul 5, 2023 ∙ 6 min
LDAP Queries for Offensive and Defensive Operations
The intention of this post is to provide basic queries for targeted AD DS information gathering used in penetration testing. The reader can
29149
0
Erica Zelickowski
Writer
Cybersecurity Consultant
More actions
bottom of page