Using Havoc C2 to bypass UACDemonstration of couple of UAC bypass methods using Havoc C2.2d ago2d ago
Mach-O file format for red team professionalsA deep dive into the Mach-O file format used in Darwin based operating systems developed by Apple (macOS, iOS, ipadOS etc.)Feb 8Feb 8
macOS security fundamentals for red team professionalsLearn about various components of macOS security architecture and how they work.Feb 2Feb 2