Abusing Windows Built-in VPN Providers
In our new blog, Research Practice Lead Christopher Paschen walks us through how to modify the system routing table when connecting to a virtual private network (VPN) with basic, user-level access. Read it now! trustedsec.com/blog/abusing...
11.03.2025 14:54 β π 0 π 1 π¬ 0 π 0
This tool took quite a bit of research and will be growing over time. Really allows exploring dit files and also includes credential extraction features :)
Alex will be doing quite a bit of public facing research and tool releases, give him a follow to stay tuned!
20.02.2025 15:01 β π 2 π 0 π¬ 0 π 0
Present @honeybadgerhax.bsky.social succeeds ;)
22.12.2024 07:15 β π 1 π 0 π¬ 1 π 0