β’οΈ Recently we started seeing Threat Actors abusing MSI Windows Installation files for Initial Access & code execution
π₯ I now release Part 1 insights into how MSIs can be abused, PoCs for π΄ & dissection utility for π΅
π¦ Let me know what you think!