<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Yazoul Security - Research</title><description>In-depth offensive and defensive security research articles.</description><link>https://www.yazoul.net/research/</link><language>en-us</language><copyright>Copyright 2026 Yazoul Security - https://www.yazoul.net/research</copyright><managingEditor>contact@yazoul.net (Yazoul Security)</managingEditor><webMaster>contact@yazoul.net (Yazoul Security)</webMaster><image><url>https://www.yazoul.net/research/icon-128.png</url><title>Yazoul Security - Research</title><link>https://www.yazoul.net/research</link></image><atom:link href="https://www.yazoul.net/research/rss.xml" rel="self" type="application/rss+xml" xmlns:atom="http://www.w3.org/2005/Atom"/><item><title>Stealth Relay: Browser-Based C2 with Chrome Extensions</title><link>https://www.yazoul.net/research/article/stealth-relay-browser-c2-with-chrome</link><guid isPermaLink="true">https://www.yazoul.net/research/article/stealth-relay-browser-c2-with-chrome</guid><description>&lt;p&gt;&lt;strong&gt;OFFENSIVE-SECURITY&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A deep dive into using Chrome extensions as a covert C2 relay, combining a C++ local agent, browser extension message passing, and a Flask command server.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/research/article/stealth-relay-browser-c2-with-chrome&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/research&quot;&gt;Yazoul Security - Research&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 26 Jun 2025 00:00:00 GMT</pubDate><category>offensive-security</category><category>Security</category><category>CyberSecurity</category><category>C2</category><category>Chrome Extensions</category><category>red-team</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Abusing Azure Blob Storage for C2 over Windows.net</title><link>https://www.yazoul.net/research/article/abusing-azure-blob-storage-for-c-over</link><guid isPermaLink="true">https://www.yazoul.net/research/article/abusing-azure-blob-storage-for-c-over</guid><description>&lt;p&gt;&lt;strong&gt;OFFENSIVE-SECURITY&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Technical analysis of using Azure Blob Storage as a covert command-and-control channel, leveraging legitimate Windows.net traffic to evade network detection.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/research/article/abusing-azure-blob-storage-for-c-over&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/research&quot;&gt;Yazoul Security - Research&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 12 Jun 2025 00:00:00 GMT</pubDate><category>offensive-security</category><category>Security</category><category>CyberSecurity</category><category>C2</category><category>Azure</category><category>cloud-security</category><author>Yazoul Security (contact@yazoul.net)</author></item></channel></rss>