Tevora Threat Blog

Filter By

Visualizing .NET Class Relationships using Roslyn and Neo4j

During a whitebox code review, having graphical representations of the layout of the code base can be highly beneficial, as the tester has limited time to learn and analyze the structure of the project.

Read More
Email Enumeration with Prowl

During an engagement, having an email list for your target can be useful for a variety of reasons.

Read More
A SharpView and More Aggressor

Any red team looking to improve is constantly adapting, changing their tactics and implementing new techniques & procedures.

Read More
Configuring Secure Boot + TPM 2

This post will walk through the process of automatically decrypting a LUKS encrypted drive on boot using a chain of trust implemented via Secure Boot and TPM 2.

Read More
Blind Command Injection Testing with Burp Collaborator

In this post we will demonstrate how Burp Collaborator can be leveraged for detecting and exploiting blind command injection vulnerabilities.

Read More
Aggressor PowerView

Tevora employs a lot of different tools depending on what our need is. During penetration tests and red teams one of the most common that is used i

Read More
5 Minute Forensics: Decoding PowerShell Payloads

Through consulting with several of our clients during IR engagements, we have discovered that several clients are taking steps to restrict and log PowerShell in their environment.

Read More
RTOps: Automating Redirector Deployment With Ansible

This blog will cover what redirectors are, why they are important for red teams, and how to automate their deployment with Ansible.

Read More
SecSmash: Leveraging Enterprise Tools

We are releasing the SecSmash tool we announced at BSIDES LV. SecSmash is a framework that allows you to turn centralized management,

Read More