- SpoofThatMail – Bash Script To Check If A Domain Or List Of Domains Can Be Spoofed Based In DMARC Records https://www.kitploit.com/2022/01/spoofthatmail-bash-script-to-check-if.html
- Exploit Kits vs. Google Chrome https://decoded.avast.io/janvojtesek/exploit-kits-vs-google-chrome/
- Espoofer – An Email Spoofing Testing Tool That Aims To Bypass SPF/DKIM/DMARC And Forge DKIM Signatures https://www.kitploit.com/2022/01/espoofer-email-spoofing-testing-tool.html
- Exploiting URL Parsing Confusion https://claroty.com/2022/01/10/blog-research-exploiting-url-parsing-confusion/
- Fantastic Symbols and Where to Find Them – Part 1 https://www.polarsignals.com/blog/posts/2022/01/13/fantastic-symbols-and-where-to-find-them/
- Scanning millions of domains and compromising the email supply chain of Australia’s most respected institutions https://caniphish.com/phishing-resources/blog/compromising-australian-supply-chains-at-scale
- Crossing the Log4j Horizon – A Vulnerability With No Return https://www.sprocketsecurity.com/blog/crossing-the-log4j-horizon-a-vulnerability-with-no-return
- Labs for Practical Malware Analysis & Triage https://github.com/HuskyHacks/PMAT-labs
- Unpacking CVE-2021-40444: A Deep Technical Analysis of an Office RCE Exploit https://billdemirkapi.me/unpacking-cve-2021-40444-microsoft-office-rce/
- LACheck – Multithreaded C# .NET Assembly Local Administrative Privilege Enumeration https://www.kitploit.com/2022/01/lacheck-multithreaded-c-net-assembly.html
