I am creating this page to bring together some of the public research and development work I've been involved with to one place:

UPnP Research

UPnP Pentest Toolkit:

https://github.com/nccgroup/UPnP-Pentest-Toolkit

BSides Manchester / Cyber Cork Presentation:

Adobe Reader Attack Surface

BSides London Presentation:

https://labs.mwrinfosecurity.com/assets/BlogFiles/Why-bother-assessing-popular-software.pdf

https://labs.mwrinfosecurity.com/assets/1008/original/mwri_advisory_javascript_privilege_escalation_in_adobe_reader.pdf

Microsoft Workspaces

Firework Tool:

https://github.com/SpiderLabs/Firework

Blog:

https://www.trustwave.com/Resources/SpiderLabs-Blog/Firework--Leveraging-Microsoft-Workspaces-in-a-Penetration-Test/

DNS Over HTTPS (DoH) Command and Control

DoHC2 Tool:

https://github.com/SpiderLabs/DoHC2

Blog:

https://www.trustwave.com/Resources/SpiderLabs-Blog/DOH!-DNS-Over-HTTPS-Poses-Possible-Risks-to-Enterprises/

Mitre ATT&CKcon Presentation:

Coverage:

https://www.scmagazineuk.com/doh-doh-risks-posed-new-https-security-proposition/article/1521182

https://www.fireeye.com/blog/products-and-services/2018/12/holiday-apt-spectacular.html

Red Team Arsenal - On Demand C# Compilation

SharpCompile Tool:

https://github.com/SpiderLabs/SharpCompile

C3 - Custom Command and Control

Joined a fantastic bunch of people from MWR Labs who worked on and ultimately released the C3 toolset for red team operators.

Tool:

https://github.com/mwrlabs/C3

Blog:

https://labs.mwrinfosecurity.com/tools/c3/

Coverage:

https://rastamouse.me/2019/09/mwr-labs-c3-first-look/