Long time dear readers. In this blog post we’ll see how to abuse a common feature in Antivirus and EDRs that’s not much talked about. I am using Defender AV as that’s common and by default across a...
(Un)Hooking, COWs and Meow Meow
Konichiwa to all my readers! Today, I’m sharing a concise blog post centered on a query that arose during a malware development training session I was conducting. This post contains my observations...
Naughty Hooking Detoxifying Memory Before Doing Crime
Introduction Konnichiwa my dear readers, I trust it’s been a while since my last update. I’m thrilled to be back, and I’m excited to delve into an intriguing, yet undeniably significant aspect of...
Remote Process Enumeration with WTS Set of Windows APIs
Introduction Hi All. I welcome you again. In this particular blog post we’ll code our own tool in C++ to gather information (list of running processes) from remote system. We will be assuming that...
Defense Evasion Series Part 1 AMSI Bypass
Introduction Hello Folks. This is the beginning of a new blog post series on various Defense Evasion techniques. In Part 1, we will look into what is AMSI, how it works and how to bypass it. Prer...
Automating Phishing Infrastructure with terraform on AWS
Introduction Hola, cariño readers. I hope you all are doing good and safe. In this blog post, I will walk you through creating an EC2 Instance on AWS and then installing and setting Gophish instan...
Docker Build Stage Security Best Practices
Introduction Hi Dear Readers, hope you all are safe and doing good. So, I welcome you all to the blog post on Docker Build Stage Security Best Practices. The title might be confusing to many since ...
TryHackMe Enterprise Walkthrough
Enterprise is an awesome box from TryHackMe by @NekoS3c You just landed in an internal network. You scan the network and there’s only the Domain Controller… Enumeration As always, we’ll st...
TryHackMe Ra Walkthrough
Ra is an awesome box from TryHackMe by @4nqr34z and @theart42. Port Scanning and Basic Enumeration As always, will start with full port scan. Will do the other enumeration alongside till the nmap...
JWT Mindmap
I have created a simple mindmap for JWT since i couldn’t find a brief one anywhere online. I took the help of this online course to build this MindMap.