en.osm.town is one of the many independent Mastodon servers you can use to participate in the fediverse.
An independent, community of OpenStreetMap people on the Fediverse/Mastodon. Funding graciously provided by the OpenStreetMap Foundation.

Server stats:

267
active users

#EDR

1 post1 participant0 posts today
Adi'Vaala vas Miðgarðr 👨🏼‍💻<p>Frage in die Runde:<br>Hat jemand von euch (oder kennt jemanden) in den letzten Jahren eine Endpoint Protection oder ein EDR in der Firma eingeführt (z.B. Jamf Protect, Microsoft Defender for Business o.ä.)?</p><p>Wie lange hat das ca. gedauert (inkl. datenschutzrechtlichen und IT-Sicherheitsabklärungen)?</p><p>Wäre um ein paar Erfahrungswerte aus der Schweiz und dem EU-Raum dankbar 🙏</p><p><a href="https://swiss.social/tags/endpointprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>endpointprotection</span></a> <a href="https://swiss.social/tags/edr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>edr</span></a> <a href="https://swiss.social/tags/MicrosoftDefender" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MicrosoftDefender</span></a> <a href="https://swiss.social/tags/JamfProtect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JamfProtect</span></a> <a href="https://swiss.social/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSecurity</span></a> <a href="https://swiss.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a></p>
Corelight<p>We’re excited to announce our new integration with Microsoft Defender for Endpoint and Microsoft Defender Vulnerability Management. This means SOC teams can now streamline incident response, reduce alert fatigue, and focus on what really matters: high-priority risks.</p><p>With real-time enrichment from Corelight and Defender, teams can:<br>➡️ Prioritize alerts based on real-time environmental risks<br>➡️ Gain deeper visibility into all devices, even unmanaged ones<br>➡️ Speed up investigations and remediation</p><p>As Todd Wingler, Corelight Vice President, Global Alliances and Channels, puts it 💬 "Corelight is now the only NDR vendor providing real-time enrichment with data from the top three EDR vendors, enabling our customers to conduct more streamlined investigations resulting in quicker remediation."</p><p>🔗 Discover how this integration enhances your SOC: <a href="https://corelight.com/company/newsroom/news/corelight-enhances-network-visibility-and-detection-coverage-with-insights-from-microsoft-defender?utm_source=mstdn&amp;utm_medium=organic-social&amp;utm_campaign=press-release&amp;utm_adgroup=microsoft-defender&amp;utm_content=SSI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">corelight.com/company/newsroom</span><span class="invisible">/news/corelight-enhances-network-visibility-and-detection-coverage-with-insights-from-microsoft-defender?utm_source=mstdn&amp;utm_medium=organic-social&amp;utm_campaign=press-release&amp;utm_adgroup=microsoft-defender&amp;utm_content=SSI</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/NDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NDR</span></a> <a href="https://infosec.exchange/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a> <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a> <a href="https://infosec.exchange/tags/MicrosoftDefender" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MicrosoftDefender</span></a></p>
Corelight<p>Join us on January 14, for “Beyond EDR: Embracing the Network-Driven Cyber Defense” — a must-attend webinar that dives into the future of threat detection.</p><p>Corelight's experts Jean Schaffer and Vincent Stoffer, alongside GuidePoint Security’s Jean-Paul Bergeaux, will break down why YARA integration is a game-changer in detecting threats beyond traditional EDR tools.</p><p>Don’t miss the chance to enhance your security stack with actionable insights from the industry leaders.</p><p>📅 Save your spot today! 🔗 Register now: <a href="https://go.corelight.com/beyond-edr-embracing-network-driven-cyber-defense?utm_source=mstdn&amp;utm_medium=organic-social&amp;utm_campaign=webinar&amp;utm_adgroup=yara&amp;utm_content=SSI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.corelight.com/beyond-edr-em</span><span class="invisible">bracing-network-driven-cyber-defense?utm_source=mstdn&amp;utm_medium=organic-social&amp;utm_campaign=webinar&amp;utm_adgroup=yara&amp;utm_content=SSI</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/YARA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YARA</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/NDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NDR</span></a> <a href="https://infosec.exchange/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a></p>
Corelight<p>Join Jean Schaffer, Federal CTO, Vincent Stoffer, Field CTO at Corelight, and Jean-Paul Bergeaux, Federal CTO at GuidePoint Security for an in-depth discussion on holistic threat detection. Learn how combining signatures, YARA, anomaly detection, and AI-augmented technologies can enhance your defense strategy.</p><p>📅 January 14, 2025 at 1 pm EST / 10 am PST<br>📍 Register now: <a href="https://lnkd.in/eZ6kdsPY" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/eZ6kdsPY</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a> <a href="https://infosec.exchange/tags/YARA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YARA</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/Webinar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Webinar</span></a></p>
Fabian Bader<p>🛡️Windows Firewall and WFP are only two ways to silence an EDR agent.<br>📢In my latest blog post I discuss another network based technique to prevent data ingest and ways to detect it.</p><p><a href="https://cloudbrothers.info/en/edr-silencers-exploring-methods-block-edr-communication-part-1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cloudbrothers.info/en/edr-sile</span><span class="invisible">ncers-exploring-methods-block-edr-communication-part-1/</span></a> </p><p>And if you want even more, checkout part 2 released by <span class="h-card" translate="no"><a href="https://infosec.exchange/@cyb3rmonk" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cyb3rmonk</span></a></span> Link in the post</p><p><a href="https://infosec.exchange/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a> <a href="https://infosec.exchange/tags/XDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XDR</span></a> <a href="https://infosec.exchange/tags/EDRSilencer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDRSilencer</span></a></p>
Claus Cramon Houmann<p>Last talk before the afternoon break, and third-last talk of this <span class="h-card" translate="no"><a href="https://infosec.exchange/@hack_lu" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>hack_lu</span></a></span> <a href="https://mastodon.social/tags/hacklu2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacklu2024</span></a> is Hilko Bengen with “Detection and response for Linux without <a href="https://mastodon.social/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a>” <span class="h-card" translate="no"><a href="https://infosec.exchange/@hillu" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>hillu</span></a></span></p>
frijolito 🎸<p>Does anyone have a good suggestion of something that can run on Mac/windows/chromeOS to perform adversary simulation to test an EDR tool? I’m thinking flightsim but it’s been a while and want to expand tools 👀<br><a href="https://infosec.exchange/tags/edr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>edr</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a></p>
hack_lu<p>Latest Updates on Kunai - Quentin Jerome </p><p><a href="https://www.youtube.com/watch?v=hOLJy_KtUK8" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=hOLJy_KtUK</span><span class="invisible">8</span></a></p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@kunai_project" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kunai_project</span></a></span> <span class="h-card" translate="no"><a href="https://misp-community.org/@misp" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>misp</span></a></span> </p><p><a href="https://infosec.exchange/tags/hacklu2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacklu2024</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/edr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>edr</span></a> <a href="https://infosec.exchange/tags/hacklu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacklu</span></a></p>
circl<p>Enhancing Detection Engineering with Automated Malware Sandboxing with <span class="h-card" translate="no"><a href="https://infosec.exchange/@kunai_project" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kunai_project</span></a></span> </p><p><a href="https://social.circl.lu/tags/detectionengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>detectionengineering</span></a> <a href="https://social.circl.lu/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://social.circl.lu/tags/edr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>edr</span></a> <a href="https://social.circl.lu/tags/sandbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sandbox</span></a> <a href="https://social.circl.lu/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://social.circl.lu/tags/threathunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threathunting</span></a> </p><p>🔗 Blog post - <a href="https://www.d4-project.org/2024/10/02/Enhancing-Detection-Engineering-with-Automated-Malware-Sandboxing.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">d4-project.org/2024/10/02/Enha</span><span class="invisible">ncing-Detection-Engineering-with-Automated-Malware-Sandboxing.html</span></a><br>🔗 Git repository - <a href="https://github.com/kunai-project/sandbox" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/kunai-project/sandb</span><span class="invisible">ox</span></a><br>🔗 Dataset - <a href="https://helga.circl.lu/NGSOTI/malware-dataset" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">helga.circl.lu/NGSOTI/malware-</span><span class="invisible">dataset</span></a></p>
Sophos X-Ops<p>With these new developments, what was formerly just an <a href="https://infosec.exchange/tags/EDRkiller" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDRkiller</span></a> tool is now a mechanism for <a href="https://infosec.exchange/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a> impairment and subversion of the operating system itself. Sophos will continue to monitor developments in this threat actor's arsenal. </p><p><a href="https://news.sophos.com/en-us/2024/08/27/burnt-cigar-2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.sophos.com/en-us/2024/08/</span><span class="invisible">27/burnt-cigar-2/</span></a></p>
Sophos X-Ops<p>Neither <a href="https://infosec.exchange/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a> attack attempt was successful, but it shows the attackers are now aware that the signing certificate is now a target for detection, and they are spending more creative energy to get around this.</p>
Sophos X-Ops<p>Last year, <a href="https://infosec.exchange/tags/SophosXOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SophosXOps</span></a> presented research about this <a href="https://infosec.exchange/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a> killing tool at Microsoft's Blue Hat conference. The kernel drivers, custom-built by the people selling this tool to ransomware gangs, had been signed with Microsoft's own WHQL certificates, lending them the appearance of legitimacy they had not earned.</p><p>(Our prior research is here: <a href="https://news.sophos.com/en-us/2022/12/13/signed-driver-malware-moves-up-the-software-trust-chain/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.sophos.com/en-us/2022/12/</span><span class="invisible">13/signed-driver-malware-moves-up-the-software-trust-chain/</span></a>)</p>
Sophos X-Ops<p>When <a href="https://infosec.exchange/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a> killers attack, they are now more aggressive and more harmful than ever. Our latest <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a> into the latest version of an EDR attack tool named <a href="https://infosec.exchange/tags/BurntCigar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BurntCigar</span></a> is now live on <span class="h-card" translate="no"><a href="https://infosec.exchange/@SophosXOps" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>SophosXOps</span></a></span></p><p><a href="https://news.sophos.com/en-us/2024/08/27/burnt-cigar-2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.sophos.com/en-us/2024/08/</span><span class="invisible">27/burnt-cigar-2/</span></a></p>
Paco Hope #resist<p>I’m kinda on the side of the US govt on this one. </p><p>We can debate how valuable traditional antivirus is. But there isn’t any debate about signing a contract that says, for better or for worse, you’re gonna do XYZ and they will pay you $ABC. If you don’t do XYZ, you didn’t uphold your side of the bargain.</p><p>And these are bullshit excuses (“I thought they were scanning over the network”) that don’t make you sound like a security professional. They just make you sound like you were lazy or you don’t know what you’re doing. </p><p><a href="https://arstechnica.com/security/2024/08/oh-your-cybersecurity-researchers-wont-use-antivirus-tools-heres-a-federal-lawsuit/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2024/</span><span class="invisible">08/oh-your-cybersecurity-researchers-wont-use-antivirus-tools-heres-a-federal-lawsuit/</span></a><br><a href="https://infosec.exchange/tags/antivirus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>antivirus</span></a> <a href="https://infosec.exchange/tags/edr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>edr</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Marcel Waldvogel<p><a href="https://waldvogel.family/tags/Gartner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gartner</span></a> lists <a href="https://waldvogel.family/tags/CrowdStrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CrowdStrike</span></a> <a href="https://waldvogel.family/tags/Falcon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Falcon</span></a> as the top <a href="https://waldvogel.family/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a> solution (tied with SentinelOne). What could possibly go wrong?<br><a href="https://www.gartner.com/reviews/market/endpoint-detection-and-response-solutions" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">gartner.com/reviews/market/end</span><span class="invisible">point-detection-and-response-solutions</span></a></p>
circl<p>Learning from the Recent Windows/Falcon Sensor Outage - Causes and Potential Improvement Strategies in Linux with Open Source</p><p>🔗 <a href="https://www.circl.lu/pub/learning-from-falcon-sensor-outage/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">circl.lu/pub/learning-from-fal</span><span class="invisible">con-sensor-outage/</span></a></p><p><a href="https://social.circl.lu/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://social.circl.lu/tags/crowdstrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crowdstrike</span></a> <a href="https://social.circl.lu/tags/edr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>edr</span></a> <a href="https://social.circl.lu/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://social.circl.lu/tags/kernelpanic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kernelpanic</span></a></p>
Taylor Parizo :donor:<p>This seems like a good time to recommend a book "Evading EDR" by Matt Hand for actual knowledge about how EDRs work. <br><a href="https://infosec.exchange/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a><br><a href="https://nostarch.com/evading-edr" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nostarch.com/evading-edr</span><span class="invisible"></span></a></p>
butterflyofChick ⏚ꝃ⌁⁂<p>Mot du jour :</p><p>Un nœud des airs.<br><a href="https://mstdn.fr/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a></p>
Marco Ivaldi<p>Clever &amp; fun technique to dump <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> LSA secrets bypassing <a href="https://infosec.exchange/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a> by <span class="h-card" translate="no"><a href="https://infosec.exchange/@sensepost" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sensepost</span></a></span> </p><p>Dumping LSA secrets: a story about task decorrelation</p><p><a href="https://sensepost.com/blog/2024/dumping-lsa-secrets-a-story-about-task-decorrelation/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sensepost.com/blog/2024/dumpin</span><span class="invisible">g-lsa-secrets-a-story-about-task-decorrelation/</span></a></p>
Marco Ivaldi<p>The Dark Side of <a href="https://infosec.exchange/tags/EDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EDR</span></a>: Repurpose EDR as an Offensive Tool</p><p>(Palo Alto Networks <a href="https://infosec.exchange/tags/Cortex" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cortex</span></a> <a href="https://infosec.exchange/tags/XDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XDR</span></a> <a href="https://infosec.exchange/tags/Attacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Attacks</span></a>)</p><p><a href="https://www.safebreach.com/blog/dark-side-of-edr-offensive-tool/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">safebreach.com/blog/dark-side-</span><span class="invisible">of-edr-offensive-tool/</span></a></p>