Malware Development Introduction aka Malware Dev 101 - Part 1
Malware Development Introduction (aka Malware Dev 101) - Part 1
Malware Development Introduction (aka Malware Dev 101) - Part 1
Sliver has been a popular open-source C2 in recent years and has had continuous improvements since its release. It’s cross-platform and easy to setup which w...
Scenario: You’re on a red team engagement and want to execute .NET utilites in your Beacon but need to increase your chances at evasion and opsec. You obviou...
For a while now, people have been using alternative callback methods in C/CSharp payloads instead of the vanilla CreateThread() or similar Windows API funct...
I’m going to cover an example of how to perform a DLL sideload from start to finish using a C++ payload and a legitimate DLL commonly found on disk. The spec...
Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.
I created a handy cheat sheet for Cobalt Strike commands for red teaming engagements which utilize both CSharp and PowerShell tools.
In October of 2018 I had the lucky opportunity to take the Sans SEC660 “Advanced Penetration Testing, Exploit Writing, and Ethical Hacking” in-person course....
A little demo walk through I made of a Linux Ret2Libc style buffer overflow to bypass DEP stack protections which is featured in the Sans GXPN course and cer...
In 2018 I started doing some freelance writing for Hitachi security systems. The posts focused on introductory penetration testing and vulnerability assessm...
Review of my OSCP experience Course link
SecurityTube Linux Assembly Expert (SLAE) Course Exercises
SecurityTube Linux Assembly Expert (SLAE) Assignment 2
SecurityTube Linux Assembly Expert (SLAE) Course Exercises