Archives
- 31 Jul Welcome
- 08 Dec SilentMoonwalk: Implementing a dynamic Call Stack Spoofer
- 08 Dec SilentMoonwalk: Implementing a dynamic Call Stack Spoofer
- 13 May From Process Injection to Function Hijacking
- 25 Feb When re-inventing the wheel is the easiest way
- 01 Feb SysWhispers is dead, long live SysWhispers!
- 19 Nov Offensive Development - Implementing Shellcode Retrieval
- 02 Aug Migrating from P/Invoke to D/Invoke
- 01 Aug The path to code execution in the era of EDR, Next-Gen AVs, and AMSI
- 13 May AV Evasion - Born from a Chimera
- 16 Sep Active Directory: Lateral Movement via PSRemoting
- 13 Jun Active Directory: Lateral Movement via DCOM
- 06 May Serialization - A Hidden Threat
- 10 Feb HTB and Vulnhub: Ted Walkthrough
- 10 Feb HTB and Vulnhub: Raven2 Walkthrough
- 10 Feb HTB and Vulnhub: Pipe Walkthrough
- 10 Feb HTB and Vulnhub: Homeless Walkthrough
- 10 Feb HTB and Vulnhub: Flick2 Walkthrough
- 10 Feb HTB and Vulnhub: An OSWE Approach