Our Latest Research and Musings

Blog post picture
20 October 2020


Want to harvest valuable credentials, maybe even install a backdoor? See how RealVNC server can be abused to use a low value asset to harvest high value credentials.

Clock10 minute read
20 October 2020 |
Blog post picture
18 July 2019

Cylance, I Kill You!

Read about our Journey of dissecting the brain of a leading AI based Endpoint Protection Product, culminating in the creation of a universal bypass

Clock25 minute read
18 July 2019 |
Blog post picture
28 March 2019

Unleash The Hash

Get the [almost] full list of MAC addresses that were targeted in the ASUS breach, and share our pain in the short story of extracting them.

Clock20 minute read
28 March 2019 |