7 Tools For Malicious Document Creation

Quick coverage of seven different tools that can be used to generate malicious macro payloads. They can then be embedded into Office documents and used for phishing.…

Using SMBClient to Enumerate Shares

This blog post seeks to demonstrate the vulnerabilities of SMB NULL sessions, and how to test them with smbclient.…

Fork Sparta, Join The Legion

A look at the tool "Legion" which is a fork of "Sparta" with some improved features.…

Visualizing Scans 2 - Dataiku

Using Dataiku DSS to generate graphs for reporting on pen tests.…

Visualizing Scans Part 1: IVRE

Part 1 of a series on managing and visualizing large amounts of scan data.…