Recent posts

Blinding EDR On Windows

23 minute read

Acknowledgements My understanding of EDRs would not be possible without the help of many great security researchers. Below are some write-ups and talks that...

Bring Your Own Interpreter (BYOI)

11 minute read

Preface These techniques that will be discussed in this paper were not discovered by myself. This technique was made popular by Marcello Salvati, a red team...

C2 Redirection For Offensive Operations

3 minute read

When creating a command-and-control infrastructure, it is common for the callbacks to not communicate directly to the attacker’s C2 server. Many times, they ...