SharpParty: Process Injection in C#

November 11, 2025 | Will Rabb

Hunter

The Invisible Battleground: Essentials of EASM

April 22, 2024 | David Broggy

Know your enemy – inside and out. External Attack Surface Management tools are ...

Fake Dialog Boxes to Make Malware More Convincing

April 17, 2024 | Ram Prakash

Let’s explore how SpiderLabs created and incorporated user prompts, ...

Evaluating Your Security Posture: Security Assessment Basics

March 25, 2024 | David Broggy

This is Part 4 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Bypassing MFA: A Pentest Case Study

March 11, 2022 | Adeeb Shah

When a company implements multifactor authentication, the organization is ...

Missing Critical Vulnerabilities Through Narrow Scoping

September 16, 2021 | John Anderson

The typical process when scoping a penetration test is to get a list of targets ...

Web Applications and Internal Penetration Tests

May 25, 2021 | Bruno Oliveira

Until recently, I really didn't care about web applications on an internal ...

Still Scanning IP Addresses You’re Doing it Wrong

July 02, 2020 | John Anderson

The traditional approach to a vulnerability scan or penetration test is to find ...

Time Windows for Penetration Testing

November 22, 2019 | Albert Campa

Often when penetration tests are scheduled, it will be requested that testing ...