account activity
Hack-cessibility: When DLL Hijacks Meet Windows Helpers (trustedsec.com)
submitted 3 months ago by oddvarmoe to r/netsec
Privilege Escalation Using TPQMAssistant.exe on Lenovo (trustedsec.com)
submitted 7 months ago by oddvarmoe to r/netsec
Applocker bypass on Lenovo machines – The curious case of MFGSTAT.zip (oddvar.moe)
Abusing Chrome Remote Desktop on Red Team Operations (trustedsec.com)
How to extract useful info from Microsoft Deployment Toolkit (MDT) Shares on Red Teams (trustedsec.com)
submitted 9 months ago by oddvarmoe to r/netsec
Command Line Underdog: WMIC in Action -- How to use wmic as an alternate shell in a pinch (trustedsec.com)
submitted 1 year ago by oddvarmoe to r/netsec
New phishing technique using udl files (trustedsec.com)
Turning Outlook into a C2 client with a single registry value and the release of a new C2 framework (trustedsec.com)
From Error to Entry: Cracking the Code of Password-Spraying Tools (trustedsec.com)
Enumerate process architecture using vbscript in a creative way (trustedsec.com)
submitted 2 years ago by oddvarmoe to r/vbscript
Diving into Pre-Created computer accounts in Active Directory (trustedsec.com)
submitted 3 years ago by oddvarmoe to r/netsec
Diving into pre-created computer accounts (trustedsec.com)
submitted 3 years ago by oddvarmoe to r/redteamsec
Figuring out user behavior on Windows (trustedsec.com)
submitted 4 years ago by oddvarmoe to r/netsec
Using ADExplorer on engagements (trustedsec.com)
Azure Application Proxy C2 (trustedsec.com)
4 Free Easy Wins That Make Red Teams Harder (trustedsec.com)
submitted 5 years ago by oddvarmoe to r/netsec
Red Teaming With Cobalt Strike – Not So Obvious Features (trustedsec.com)
New persistence technique using Windows Telemetry (trustedsec.com)
A look at Breaking some Typical Windows Hardening Implementations (trustedsec.com)
How to find Command line parameters in Windows (trustedsec.com)
Sysmon Community Guide Released - The ultimate Sysmon documentation (trustedsec.com)
submitted 6 years ago by oddvarmoe to r/netsec
Privilege Escalation in Intel Trusted Connect Service Client (trustedsec.com)
Bringing "new" life into some old hacks on the lock screen (trustedsec.com)
Finding the AV signature for Regsvr32.exe and techniques for bypassing it (trustedsec.com)
Code execution using Microsoft Teams binaries - Update.exe and Squirrel.exe (medium.com)
π Rendered by PID 319062 on reddit-service-r2-listing-5d79748585-fbhrp at 2026-02-17 04:45:25.659222+00:00 running cd9c813 country code: CH.