Threat Hunting series I
Detect a c2 by it’s user agent variations. Part I.Searching anomalies There are many ways to detect c2, some very advanced and sophisticated techniques, however the following use case unlike…
Testing & building an exploit inside chatGPT
How to build an exploit through chatGPT AI. Think of a future where exploits are not sold directly, but rather inputs for AI systems that allow the creation of those…