Archives
- 31 Aug Enumerating OS Artifacts: How Malware Profiles Sandboxes, VMs, and Targets
- 31 Aug Building an Anti-Evasion Malware Analysis Lab
- 30 Aug RTF Exploit
- 30 Aug Adobe PDF Exploit
- 20 Aug Process Enumeration
- 04 Aug A Deep Dive into Legacy Bootkits and Rootkits
- 28 Jun Implementing Direct Syscalls in Rust
- 16 Jun API Hooking
- 02 Jun Understanding Active Directory Security Descriptors
- 19 May Implementing Early Bird APC Injection in Rust
- 12 May Kerberos Delegation
- 25 Apr IAT Hiding & Obfuscation
- 21 Apr Process Argument Spoofing
- 31 Mar Windows Lateral Movements
- 24 Mar Understanding Kerberos