categories

Shellcoding

x64 Assembly & Shellcoding 101 - Conclusion

16 minute read

Well it’s been a fun ride, but we’ve reached our destination. 🚗 Time to wrap things up with our Assembly and Shellcoding 101 course and move on to the next e...

x64 Assembly & Shellcoding 101 - Part 6

7 minute read

Today is reverse shell day! I’m sure most of you were hoping we’d eventually be able to discuss writing a reverse shell using x64 assembly, and today just s...

x64 Assembly & Shellcoding 101 - Part 5

7 minute read

Well, you will all be happy to know I’m finally keeping my word and doing what I promised early on in the series…We’re going to do the following today:

x64 Assembly & Shellcoding 101 - Part 4

6 minute read

Hey all! This will be a shorter post today, so I’ll get right to it. Let’s talk shellcode basic encoding functionality built in to x64 assembly instruction...

x64 Assembly & Shellcoding 101 - Part 3

6 minute read

Now is the time for the expected continuation of part 1 of this blog series, where we clean up our code and remove those NULLs. In this way, we’ll be able t...

x64 Assembly & Shellcoding 101 - Part 2

3 minute read

Okay, I lied 😄 I thought I’d use part 2 to discuss removing NULL bytes, and that’s going to happen I promise! But I had some good feedback from the first p...

x64 Assembly & Shellcoding 101

16 minute read

I have admittedly scoured the internet looking for examples of basic x64 shellcode development and have not had much luck. So many tutorials and lessons see...

Back to top ↑

Assembly

x64 Assembly & Shellcoding 101 - Conclusion

16 minute read

Well it’s been a fun ride, but we’ve reached our destination. 🚗 Time to wrap things up with our Assembly and Shellcoding 101 course and move on to the next e...

x64 Assembly & Shellcoding 101 - Part 6

7 minute read

Today is reverse shell day! I’m sure most of you were hoping we’d eventually be able to discuss writing a reverse shell using x64 assembly, and today just s...

x64 Assembly & Shellcoding 101 - Part 5

7 minute read

Well, you will all be happy to know I’m finally keeping my word and doing what I promised early on in the series…We’re going to do the following today:

x64 Assembly & Shellcoding 101 - Part 4

6 minute read

Hey all! This will be a shorter post today, so I’ll get right to it. Let’s talk shellcode basic encoding functionality built in to x64 assembly instruction...

x64 Assembly & Shellcoding 101 - Part 3

6 minute read

Now is the time for the expected continuation of part 1 of this blog series, where we clean up our code and remove those NULLs. In this way, we’ll be able t...

x64 Assembly & Shellcoding 101 - Part 2

3 minute read

Okay, I lied 😄 I thought I’d use part 2 to discuss removing NULL bytes, and that’s going to happen I promise! But I had some good feedback from the first p...

x64 Assembly & Shellcoding 101

16 minute read

I have admittedly scoured the internet looking for examples of basic x64 shellcode development and have not had much luck. So many tutorials and lessons see...

Back to top ↑

Debugging

x64 Assembly & Shellcoding 101 - Conclusion

16 minute read

Well it’s been a fun ride, but we’ve reached our destination. 🚗 Time to wrap things up with our Assembly and Shellcoding 101 course and move on to the next e...

x64 Assembly & Shellcoding 101 - Part 6

7 minute read

Today is reverse shell day! I’m sure most of you were hoping we’d eventually be able to discuss writing a reverse shell using x64 assembly, and today just s...

x64 Assembly & Shellcoding 101 - Part 5

7 minute read

Well, you will all be happy to know I’m finally keeping my word and doing what I promised early on in the series…We’re going to do the following today:

x64 Assembly & Shellcoding 101 - Part 4

6 minute read

Hey all! This will be a shorter post today, so I’ll get right to it. Let’s talk shellcode basic encoding functionality built in to x64 assembly instruction...

x64 Assembly & Shellcoding 101 - Part 3

6 minute read

Now is the time for the expected continuation of part 1 of this blog series, where we clean up our code and remove those NULLs. In this way, we’ll be able t...

x64 Assembly & Shellcoding 101 - Part 2

3 minute read

Okay, I lied 😄 I thought I’d use part 2 to discuss removing NULL bytes, and that’s going to happen I promise! But I had some good feedback from the first p...

x64 Assembly & Shellcoding 101

16 minute read

I have admittedly scoured the internet looking for examples of basic x64 shellcode development and have not had much luck. So many tutorials and lessons see...

Back to top ↑

privilege escalation

Back to top ↑

Threat Hunting

Sending Sysmon Logs to Elastic ELK stack

1 minute read

Let’s pickup where we left off. If you haven’t done so already, please do check out the previous writeup on how to setup Elastic Stack, Logstash, and Kibana...

Installing Elastic Stack (ELK) from Scratch

3 minute read

Hey there red team….I mean BLUE TEAM cadet 😅 I don’t just focus on red team stuff you know…and it’s been long overdue that I do a writeup on not just red t...

Back to top ↑

C2

Create your own C2 using Python- Part 3

9 minute read

Twas 5 days before Christmas, and all through the night. Not a sound was heard, because we bypassed EDR with no alerts in sight! 🎅

Create your own C2 using Python- Part 2

7 minute read

Hey everyone! Welcome to Part 2 of the Create your own C2 series. You have likely learned by now this is not going to be some crazy beefed out C2. My main...

Create your own C2 using Python- Part 1

10 minute read

Back in days of my adolescence, I was fascinated with all things Metasploit. I was a ripe old teenager when Metasploit first came out, and I was enamored by...

Back to top ↑

Python

Create your own C2 using Python- Part 3

9 minute read

Twas 5 days before Christmas, and all through the night. Not a sound was heard, because we bypassed EDR with no alerts in sight! 🎅

Create your own C2 using Python- Part 2

7 minute read

Hey everyone! Welcome to Part 2 of the Create your own C2 series. You have likely learned by now this is not going to be some crazy beefed out C2. My main...

Create your own C2 using Python- Part 1

10 minute read

Back in days of my adolescence, I was fascinated with all things Metasploit. I was a ripe old teenager when Metasploit first came out, and I was enamored by...

Back to top ↑

Aboutme

Introductions

1 minute read

I currently serve in a senior management infosec role. I started out as a network admin, then eventually landed a gig as Senior security analyst. Not long af...

Back to top ↑

Encoding

Back to top ↑

Sockets

Back to top ↑

EDR Bypass

Malware EDR Evasion Techniques

8 minute read

Yo, how’s it going everyone. Sorry it’s been a while since my last post. Fear not, I’m geared up and ready to dive in to a full discussion on Malware evasi...

Back to top ↑

NTLMv2 hashes

Back to top ↑

Privilege Escalation

Creative UAC Bypass Methods for the Modern Era

11 minute read

It’s been almost a year since my last post, and during that time I have acquired a strong interest in revisiting privilege escalation techniques for the mode...

Back to top ↑

CVE

Back to top ↑

MSI

Back to top ↑