https://github.com/sensepost/mail-in-the-middle
1.3.2024 08:33https://github.com/sensepost/mail-in-the-middleBuilding on top of work that an ex-plakker did (Willem Mouton) I automated the technique, and enjoyed the process a lot: here's Mail-in-the-middle, helping you to automate spear phishing campaigns at a scale https://sensepost.com/blog/2024/mail-in-the-middle-a-tool-to-automate-spear-phishing-campaigns/
📤👨💻📥
1.3.2024 08:33Building on top of work that an ex-plakker did (Willem Mouton) I automated the technique, and enjoyed the process a lot: here's...I had a punk deja-vu today
23.12.2023 20:03I had a punk deja-vu todayCreated a quick and dirty PS script to find writable folders in systems where AppLocker is enforced and you cannot execute "accesschk.exe" 🚫
https://gist.github.com/felmoltor/a6e57000fc7bee8d3b0350abee105e33
23.11.2023 10:22Created a quick and dirty PS script to find writable folders in systems where AppLocker is enforced and you cannot execute...Heh, I have now my research about new ways to abuse third-party trusts in Content-Security Policies in Hacktrics https://book.hacktricks.xyz/pentesting-web/content-security-policy-csp-bypass#third-party-abuses 🥳
6.11.2023 09:19Heh, I have now my research about new ways to abuse third-party trusts in Content-Security Policies in Hacktrics...I finally published my Dress Code talk contents here 🥳 : https://sensepost.com/blog/2023/dress-code-the-talk/
Check it out to find six new ways (and two that are not very well-known out there) to bypass CSP by abusing excessive trust in third-parties domains. 🚀
26.10.2023 20:32I finally published my Dress Code talk contents here 🥳 : https://sensepost.com/blog/2023/dress-code-the-talk/Check it out to find six new...