From Amsi(RE) to Reflection, Manually Bypassing
2025-01-30
Hooking AMSI APIs and performing reverse engineering to analyze calls and develop a bypass.
1246 words
|
6 minutes
Cover Image of the Post
Opening The Hells Gate
2025-01-29
Demystifying Hells Gate Technique
3860 words
|
19 minutes
Cover Image of the Post
Forget Golden Tickets, Live The Era Of Certificates
Certificates can be more interesting than golden tickets..
2613 words
|
13 minutes
Cover Image of the Post
Using fibers for shellcode execution
Using fibers instead of threads to execute shellcode
483 words
|
2 minutes
Cover Image of the Post
Understanding API Hooking
An introductory view of what it is, how it works and practical applications of the API Hooking technique used in defense solutions such as AV/EDR
1712 words
|
9 minutes
Cover Image of the Post
Transforming Mimikatz into a Shellcode and Bypassing Defender
How to transform mimikatz into shellcode to bypass AVs and EDRs
566 words
|
3 minutes
Cover Image of the Post
Hiding System Calls using Ordinals in C#
A little bit about how to use ordinals to hide system calls in C#
814 words
|
4 minutes
Cover Image of the Post
1