安全研究人员博客
RSS动态聚合
-
Steganography is still relevant!
Hi all! Today we have a guest on the blog. Let me introduce you to Phoebe, a hacker extraordinair... -
Bypassing UAC via Intel ShaderCache Directory
I’ll readily admit my discord server inspired this most recent research into a sort of newly disc... -
Create your own C2 using Python- Part 3
Twas 5 days before Christmas, and all through the night. Not a sound was heard, because we bypass... -
Create your own C2 using Python- Part 2
Hey everyone! Welcome to Part 2 of the Create your own C2 series. You have likely learned by now ... -
Create your own C2 using Python- Part 1
Back in the good ole days of my adolescence, I was fascinated with all things Metasploit. I was a... -
Make a COFFee relax and bypass AMSI
This blog post presents the use of COFF Loaders and COFF objects through a case study implementin... -
Leveraging the Spring Expression Language (SpEL) injection vulnerability ( a.k.a The Magic SpEL) to get RCE
This blog post explains the Spring Expression Language injection (SpEL) issue and shows how to be... -
Win32 reverse shellcode - pt .3 - Constructing the reverse shellcode
This blog post explains how to construct a Win32 reverse TCP shell connection in x86 assembly -
Win32 reverse shellcode - pt .2 - locating the Export Directory Table
This blog post shows how to locate the Export Directory Table from the PE file structure -
Win32 reverse shellcode - pt .1 - Locating the kernelbase.dll address
This blog post shows how to locate the kernelbase.dll address using winDbg debugger in x86 assemb...