Next time you browse our catalogue, you'll see a new view to find payloads combining popular attack techniques; from Pastejacking and Bring Your Own Interpreter, to HTML Smuggling and Auth Coercion.
Find out more at delivr.to/app/payloads
Next time you browse our catalogue, you'll see a new view to find payloads combining popular attack techniques; from Pastejacking and Bring Your Own Interpreter, to HTML Smuggling and Auth Coercion.
Find out more at delivr.to/app/payloads
Thank you to everyone who's been a part of delivr.to's journey this year! We’re incredibly excited about what’s coming your way in 2025—stay tuned!
Happy New Year everyone! 🎉
Thank you to everyone who's been a part of delivr.to's journey this year! We’re incredibly excited about what’s coming your way in 2025—stay tuned!
Happy New Year everyone! 🎉
🔍 Detect with our YARA rule: github.com/delivr-to/de...
🛡️ Test weaponised SVG delivery: delivr.to/?search=.svg
🔍 Detect with our YARA rule: github.com/delivr-to/de...
🛡️ Test weaponised SVG delivery: delivr.to/?search=.svg
In our testing, multiple instances of these byte sigs reliably detected this technique
🧵3/3
In our testing, multiple instances of these byte sigs reliably detected this technique
🧵3/3
This also has implications for mail filters that ‘open’ the zip to analyse its contents
🧵2/3
This also has implications for mail filters that ‘open’ the zip to analyse its contents
🧵2/3