- 📖 I’m currently working on threat hunting
- 📘 I’m currently learning everything 🤣
- 🎭 I’m looking to explore purple teaming
- ☑️ 2023 Goals: Contribute more to Open Source projects
- Using scdbg to analyze shellcode
- [#E02] Secure Code Review for Beginners: SQL Injection
- System Calls For Hackers
- Malware Development: Thread HiJacking
- RVAsec 2024: Corey Overstreet - That Shouldn't Have Worked - Payload Development 101
- Lets Go Around Defender with NativeDump
- Digital Forensics Bootcamp
- 16. Nick Powers: Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover
- Exploiting DLL Hijacking with Rust & Golang: Step-by-Step Guide
- ShellBag Forensics
- cowbe0x004 starred PANIX
- cowbe0x004 starred airstrike
- cowbe0x004 starred PowerParse
- cowbe0x004 starred ShimMe
- cowbe0x004 starred Koppeling
- cowbe0x004 starred BadZure
- cowbe0x004 starred Shwmae
- cowbe0x004 starred Maestro
- cowbe0x004 starred TrickDump
- cowbe0x004 starred Invoke-Maldaptive
- RT Devansh (⚡, 🥷): If you, like many, think relying just on
cat
command's output is enough to be sure about the integrity of a bash file. Think ... - RT Alh4zr3d: Red Teamers: Windows Subsystem for Linux (WSL) is more and more common, especially on dev workstations. Don't neglect it! WSL rev shell: ...
- RT Grzegorz Tworek: Need an almost invisible, post-exploitation, persistent, fileless, LPE backdoor? There are many, but this one looks really beautif...
- RT Mr. Rc: Are you interested in learning reverse engineering in 2023? I've spent the this year studying RE, and I want to share all the resources tha...
- RT Oliver Lyak: Today we're publishing new techniques for recovering NTLM hashes from encrypted credentials protected by Windows Defender Credential G...