Click here to download all references as Bib-File.
2023-06-28 ⋅ SpecterOps ⋅ Sowing Chaos and Reaping Rewards in Confluence and Jira |
2021-11-09 ⋅ SpecterOps ⋅ Capability Abstraction Case Study: Detecting Malicious Boot Configuration Modifications |
2021-06-17 ⋅ SpecterOps ⋅ Shadow Credentials: Abusing Key Trust Account Mapping for Account Takeover |
2021-06-01 ⋅ SpecterOps ⋅ Evadere Classifications |
2019-04-24 ⋅ SpecterOps ⋅ Introducing Venator: A macOS tool for proactive detection AppleJeus WindTail |