Any red team looking to improve is constantly adapting, changing their tactics and implementing new techniques & procedures.
This post will walk through the process of automatically decrypting a LUKS encrypted drive on boot using a chain of trust implemented via Secure Boot and TPM 2.
In this post we will demonstrate how Burp Collaborator can be leveraged for detecting and exploiting blind command injection vulnerabilities.
Tevora employs a lot of different tools depending on what our need is. During penetration tests and red teams one of the most common that is used i
Through consulting with several of our clients during IR engagements, we have discovered that several clients are taking steps to restrict and log PowerShell in their environment.
This blog will cover what redirectors are, why they are important for red teams, and how to automate their deployment with Ansible.
We are releasing the SecSmash tool we announced at BSIDES LV. SecSmash is a framework that allows you to turn centralized management,
Password cracking is a crucial part of a pentest. It can either lead you to the promised land, or stop you dead in your tracks.
When I came across the tool BloodHound, it quickly became one of the go-to tools in my arsenal.