Lucene search

K

Building a bypass with MSBuild

🗓️ 19 Feb 2020 05:35:06Reported by [email protected] (Vanja Svajcer)Type 
talosblog
 talosblog
🔗 feedproxy.google.com👁 62 Views

MSBuild utilized for post-exploitation activities, can include malware in source code format to bypass application whitelisting, code compiled in memory, obfuscation of payloa

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
19 Feb 2020 05:06Current
7.3High risk
Vulners AI Score7.3
62
.json
Report