During a whitebox code review, having graphical representations of the layout of the code base can be highly beneficial, as the tester has limited time to learn and analyze the structure of the project.
During an engagement, having an email list for your target can be useful for a variety of reasons.
Any red team looking to improve is constantly adapting, changing their tactics and implementing new techniques & procedures.
This post will walk through the process of automatically decrypting a LUKS encrypted drive on boot using a chain of trust implemented via Secure Boot and TPM 2.
In this post we will demonstrate how Burp Collaborator can be leveraged for detecting and exploiting blind command injection vulnerabilities.
Tevora employs a lot of different tools depending on what our need is. During penetration tests and red teams one of the most common that is used i
Through consulting with several of our clients during IR engagements, we have discovered that several clients are taking steps to restrict and log PowerShell in their environment.
This blog will cover what redirectors are, why they are important for red teams, and how to automate their deployment with Ansible.
We are releasing the SecSmash tool we announced at BSIDES LV. SecSmash is a framework that allows you to turn centralized management,