Home
Aman's Blog
Cancel

Automating Vulnerability Data Extraction from MS Defender for Endpoint using Azure DevOps

Simplifying Vulnerability Data Extraction with Azure DevOps In the realm of cybersecurity, managing vulnerabilities is a critical task. Microsoft Defender offers robust tools for monitoring and an...

Red Teaming: DataExfil using Cloudflare Argo Tunnel

If you are engaged in a Red Team activity or security assessment and are looking to test the data exfiltration capability you can try making use of CloudFlare’s Argo Tunnel. Assuming you have comp...

Is your 2FA really secure?

When it comes to protecting online accounts, a general security advice given is to enable two/multi factor authentication where possible. Almost everyone knows that two factor authentication is b...

How to use Multipass to quickly spin up Ubuntu VMs

How to use Multipass to quickly spin up Ubuntu VMs Sometimes, you may need to spin up Linux virtual machines for testing, and it can be time-consuming to download and install images repeatedly. Mu...