Posts
-
Decrypting any .DEC files on HackNet game
-
User-level bind shell bypassing host-firewall restrictions
-
Coding a reliable CVE-2019-084 bypass
-
Solving Pwn-02 from e-Security 2018 CTF
-
Solving Pwn-01 from e-Security 2018 CTF
-
Pwning computers using Telegram bot API
-
Oh No! AMSI blocked the AMSI Bypass! What now?
-
Recovering Plaintext Domain Credentials from WPA2 Enterprise on a Compromised Host
-
How to bypass UAC in newer Windows versions
-
How to bypass AMSI and execute ANY malicious Powershell code
-
Windows API and Impersonation Part 2 - How to get SYSTEM using Impersonation Tokens
-
Windows API and Impersonation Part 1 - How to get SYSTEM using Primary Tokens
-
PowerShell Ransomware - Writeup
-
DLL Reversing - Writeup
-
Kraken - Writeup
-
Blog is back!
subscribe via RSS