▲ 3 r/purpleteamsecThreat Analysis: Backdoored Electron Apps Evading Defenseslevelblue.com u/netbiosX — 16 hours ago
▲ 40 r/pwnhub+4 crosspostsA stealth approach to Process Injection - EntryPoint Hijackingipurple.team u/netbiosX — 19 hours ago
▲ 3 r/purpleteamsecmagnetar - A EDR bypassing shellcode loader framework for Windows 10 64bit, featuring ETW/AMSI patching, Tartarus Gate, process protection and moregithub.com u/netbiosX — 2 days ago
▲ 3 r/purpleteamsecDetecting Remote Thread Creation with Windows Drivermedium.com u/netbiosX — 2 days ago
▲ 1 r/purpleteamsecDetection Engineering Best Practices: Performance, Readability & Maintenancekqlquery.com u/netbiosX — 2 days ago
▲ 2 r/purpleteamsecAdversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Accesscloud.google.com u/netbiosX — 3 days ago
▲ 7 r/purpleteamsecUnmanaged PowerShell Execution: Hunting Beyond powershell.exedetect.fyi u/netbiosX — 4 days ago
▲ 4 r/purpleteamsecPurple Team Exercise Framework v4 - AI/ML Threat Guidance, Cloud & Identity Coverage, Continuous Purple Teaming and Moregithub.com u/netbiosX — 4 days ago
▲ 3 r/purpleteamsecPositiveIntent - Evasive loader for .NET Framework assembliesgithub.com u/netbiosX — 7 days ago
▲ 4 r/purpleteamsecThe Accidental C2: Exploring Dev Tunnels for Remote Accessspecterops.io u/netbiosX — 8 days ago
▲ 1 r/purpleteamsecHyperVenom: Using Hyper-V for Ring -1 Control from Usermodegsmll.github.io u/netbiosX — 8 days ago
▲ 1 r/purpleteamsecUEBA & entity analytics: Why entity record quality matterselastic.co u/netbiosX — 8 days ago
▲ 2 r/purpleteamsecLiving of the Land - DISM Sandbox Provider Hijackresearch.nasbench.dev u/netbiosX — 9 days ago
▲ 2 r/purpleteamsecdMSA Ouroboros: Self-Sustaining Credential Extraction in Windows Server 2025huntress.com u/netbiosX — 10 days ago