Using their own weapons for defense - A SharePoint story
Jul 23, 2025
·
BloodyShell
·
7 mins read
Exploring our adventure while building detection for SharePoint exploitation and vulnerability.
Exploring our adventure while building detection for SharePoint exploitation and vulnerability.
Why Buying Likes and Retweets Compromises Our Digital Ethics
Exploring the so called NT ANONYMOUS_LOGON user through HTTP endpoints