1Automating APT Scanning with Loki Scanner and Splunk (opens in new tab)(redblue.team)1Epicism8y ago0
2Abusing Google App Scripting Through Social Engineering (opens in new tab)(redblue.team)1Epicism9y ago0
3Red|blue: PowerShell: A Traceless Threat and How to Protect Yourself (opens in new tab)(redblue.team)1Epicism10y ago0
4Using the Modern Honey Network to Detect Malicious Activity (opens in new tab)(redblue.team)2Epicism10y ago0
5Spotting the Adversary with Windows Event Log Monitoring (opens in new tab)(redblue.team)1Epicism10y ago0