PinnedPublished inInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 1My learnings on how the different steps in EDR and Antivirus techniques are used in the field.Oct 29, 2023Oct 29, 2023
PinnedPublished inInfoSec Write-upsStealthy Persistence While Using Windows Terminal.By misusing the setting fileNov 9, 2022Nov 9, 2022
Penetration testing a Kubernetes environmentSearching for weaknesses in the configuration.6d ago6d ago
Published inInfoSec Write-upsSecuring your malware from being hookedBy only allowing Microsoft signed DLL'sDec 23, 2023Dec 23, 2023
Published inInfoSec Write-upsEvading Detection With Nmap Part 2Analyzing how Nmap -sV probes give your assessment awayNov 29, 20231Nov 29, 20231
Published inInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 3Reading into Direct Syscalls with Syswhispers.Nov 21, 2023Nov 21, 2023
Published inInfoSec Write-upsEvading Detection while using nmapUnderstanding how nmaplowercheck will give you awayNov 17, 2023Nov 17, 2023
Published inInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 2Common techniques for performing sandbox and Virtualmachine evasion by AV and EDRNov 11, 2023Nov 11, 2023
Published inInfoSec Write-upsTaking your web application pentesting to another levelBy making use of Bchecks in Burp suiteAug 13, 2023Aug 13, 2023