PinnedPublished inInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 1My learnings on how the different steps in EDR and Antivirus techniques are used in the field.Oct 29, 2023Oct 29, 2023
PinnedPublished inInfoSec Write-upsStealthy Persistence While Using Windows Terminal.By misusing the setting fileNov 9, 2022Nov 9, 2022
Published inInfoSec Write-upsSecuring your malware from being hookedBy only allowing Microsoft signed DLL'sDec 23, 2023Dec 23, 2023
Published inInfoSec Write-upsEvading Detection With Nmap Part 2Analyzing how Nmap -sV probes give your assessment awayNov 29, 20231Nov 29, 20231
Published inInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 3Reading into Direct Syscalls with Syswhispers.Nov 21, 2023Nov 21, 2023
Published inInfoSec Write-upsEvading Detection while using nmapUnderstanding how nmaplowercheck will give you awayNov 17, 2023Nov 17, 2023
Published inInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 2Common techniques for performing sandbox and Virtualmachine evasion by AV and EDRNov 11, 2023Nov 11, 2023
Published inInfoSec Write-upsTaking your web application pentesting to another levelBy making use of Bchecks in Burp suiteAug 13, 2023Aug 13, 2023
Published inInfoSec Write-upsRewriting IP for filter bypassIpv4 addresses are built as 4 blocks of integers which can range from 0 to 255. If we want to ping localhost we are used to write 127.0.0.1…Aug 10, 2023Aug 10, 2023