PinnedPublished inInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 1My learnings on how the different steps in EDR and Antivirus techniques are used in the field.Oct 29, 2023Oct 29, 2023
PinnedPublished inInfoSec Write-upsStealthy Persistence While Using Windows Terminal.By misusing the setting fileNov 9, 2022Nov 9, 2022
Published inInfoSec Write-upsPenetration testing a Kubernetes environmentSearching for weaknesses in the configuration.Feb 24Feb 24
Published inInfoSec Write-upsSecuring your malware from being hookedBy only allowing Microsoft signed DLL'sDec 23, 2023Dec 23, 2023
Unhooking EDR by remapping ntdll.dllBy Remapping ntdll from disk Dec 7, 2023A response icon1Dec 7, 2023A response icon1
Published inInfoSec Write-upsEvading Detection With Nmap Part 2Analyzing how Nmap -sV probes give your assessment awayNov 29, 2023A response icon1Nov 29, 2023A response icon1
Published inInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 3Reading into Direct Syscalls with Syswhispers.Nov 21, 2023Nov 21, 2023
Published inInfoSec Write-upsEvading Detection while using nmapUnderstanding how nmaplowercheck will give you awayNov 17, 2023Nov 17, 2023
Published inInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 2Common techniques for performing sandbox and Virtualmachine evasion by AV and EDRNov 11, 2023Nov 11, 2023
Published inInfoSec Write-upsTaking your web application pentesting to another levelBy making use of Bchecks in Burp suiteAug 13, 2023Aug 13, 2023