Posts
Dazzy Ddos
Cancel

Remote Process Enumeration with WTS Set of Windows APIs

Introduction Hi All. I welcome you again. In this particular blog post we’ll code our own tool in C++ to gather information (list of running processes) from remote system. We will be assuming that...

Defense Evasion Series Part 1 AMSI Bypass

Introduction Hello Folks. This is the beginning of a new blog post series on various Defense Evasion techniques. In Part 1, we will look into what is AMSI, how it works and how to bypass it. Prer...

Automating Phishing Infrastructure with terraform on AWS

Introduction Hola, cariño readers. I hope you all are doing good and safe. In this blog post, I will walk you through creating an EC2 Instance on AWS and then installing and setting Gophish instan...

Docker Build Stage Security Best Practices

Introduction Hi Dear Readers, hope you all are safe and doing good. So, I welcome you all to the blog post on Docker Build Stage Security Best Practices. The title might be confusing to many since ...

TryHackMe Enterprise Walkthrough

Enterprise is an awesome box from TryHackMe by @NekoS3c You just landed in an internal network. You scan the network and there’s only the Domain Controller… Enumeration As always, we’ll st...

TryHackMe Ra Walkthrough

Ra is an awesome box from TryHackMe by @4nqr34z and @theart42. Port Scanning and Basic Enumeration As always, will start with full port scan. Will do the other enumeration alongside till the nmap...

JWT Mindmap

I have created a simple mindmap for JWT since i couldn’t find a brief one anywhere online. I took the help of this online course to build this MindMap.

Introduction to Linux 32 bit exploit development

Introduction Hope you are all good, awesome and enjoying your life so far. So, without wasting much time, let’s get started. I am also going to be assuming here that you all are familiar with bas...