Madhav BhattgcpHound v2.0 : Django Web UI To Analyze IAM PermissionsIn this article, we will talk about recent functionalities added to the gcpHound as well as how to use them.3 min read·Apr 26, 2022----
Madhav BhattCustom Metasploit Module for Log4Shell ScannerIn this article, we will discuss a customized Metasploit module I wrote for scanning applications vulnerable to Log4Shell as well as how…4 min read·Dec 21, 2021----
Madhav BhattCompromised Endpoint to Compromised GCP : Gone in 60 SecondsIn this article, we will discuss how you can take over google cloud accounts, if you have compromised an endpoint. Once you get a hang of…4 min read·Oct 8, 2021----
Madhav BhattgcpHound : A Swiss Army Knife Offensive Toolkit for Google Cloud Platform (GCP)In this article, we will talk about a new tool written by me alongside Brad Richardson called “gcpHound” as well as some of the…6 min read·Sep 7, 2021----
Madhav BhattDetection NavigatorIn my previous article, I have discussed how to build detection chart using MITRE ATT&CK Framework. However, as I mentioned at the very…5 min read·Apr 20, 2021----
Madhav BhattOffice365 MacOS Sandbox EscapeIn this article, we are going to review how we can escape the Office365 sandbox in MacOS Catalina. Apple has hardened MacOS environment in…8 min read·Oct 14, 2020----
Madhav BhattExecuting Purple Team ExercisesIn previous article , we talked about how to build Detection Chart using MITRE ATT&CK Framework. In this article, we will leverage those…7 min read·Apr 10, 2020----
Madhav BhattBuilding Detection Chart Using MITRE ATT&CK FrameworkThis article is about how MITRE ATT&CK Framework can be leveraged to measure current detection capability of the organization. There are …6 min read·Oct 2, 2019----
Madhav BhattConverting an .app file to .dmg on MacOSThis article is about simple steps to follow to convert .app file to .dmg file. The main reason for this article is , During an engagement…3 min read·Aug 24, 2019----
Madhav BhattHow to Create HTTP(s) Command and ControlCommand and Control ( C2 ) is one of the most essential part of red team engagements. There are a lot tools out there that are designed…3 min read·Aug 18, 2019----