Implants and other offensive security hardware placed within the target environment and used to ex-filtrate data from the target network to a remote asset.


Setting up the ‘PhanTap’

The ‘PhanTap’ is an ‘invisible’ network tap written by the guys at NCC Group and aimed at red teams. With limited physical access to...
2 min read


I am currently updating the site, so posts will starting showing up from my previous blog very soon.