Attack Vector Development - Border Cyber Group

ATTACK VECTOR DEVELOPMENT RESOURCES ... HARMLESS MUSINGS ON DISCREET TACTICAL INCURSION, WEAPONIZED CODE INJECTION, LATERAL MOVEMENT, PERSISTENT TARGET CONTROL, PRIVILEGE ESCALATION AND FOOTPRINT OBFUSCATION

Helpful Pentesting Tips and Pentesting Methodolody Insights

Watch the masters at IPPsec hacking the HTB boxes...

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Nmap Tip: No Zenmap? nmap not working? Install ZENMAP in Kali Linux

Online Password Checking and Cracking

How Return-Oriented Programming Exploits Work

Three Attack Vectors That Target Your Data - Data Modeling and Integrity Vulnerabilities

Exploit Kits: Lowering the Bar for Malicious Hackers

Weaponize PDF docs to Steal Windows Credentials

Most Common Vectors Exploited Against Critical Infrastructure

Threat Hunting on Common Attack Vectors and Delivery Channels

The Future of Hacking With Nanotechnology