tags

2024

Create your own C2 using Python- Part 3

9 minute read

Twas 5 days before Christmas, and all through the night. Not a sound was heard, because we bypassed EDR with no alerts in sight! 🎅

Create your own C2 using Python- Part 2

7 minute read

Hey everyone! Welcome to Part 2 of the Create your own C2 series. You have likely learned by now this is not going to be some crazy beefed out C2. My main...

Create your own C2 using Python- Part 1

10 minute read

Back in days of my adolescence, I was fascinated with all things Metasploit. I was a ripe old teenager when Metasploit first came out, and I was enamored by...

x64 Assembly & Shellcoding 101 - Conclusion

16 minute read

Well it’s been a fun ride, but we’ve reached our destination. 🚗 Time to wrap things up with our Assembly and Shellcoding 101 course and move on to the next e...

x64 Assembly & Shellcoding 101 - Part 6

7 minute read

Today is reverse shell day! I’m sure most of you were hoping we’d eventually be able to discuss writing a reverse shell using x64 assembly, and today just s...

x64 Assembly & Shellcoding 101 - Part 5

7 minute read

Well, you will all be happy to know I’m finally keeping my word and doing what I promised early on in the series…We’re going to do the following today:

x64 Assembly & Shellcoding 101 - Part 4

6 minute read

Hey all! This will be a shorter post today, so I’ll get right to it. Let’s talk shellcode basic encoding functionality built in to x64 assembly instruction...

x64 Assembly & Shellcoding 101 - Part 3

6 minute read

Now is the time for the expected continuation of part 1 of this blog series, where we clean up our code and remove those NULLs. In this way, we’ll be able t...

x64 Assembly & Shellcoding 101 - Part 2

3 minute read

Okay, I lied 😄 I thought I’d use part 2 to discuss removing NULL bytes, and that’s going to happen I promise! But I had some good feedback from the first p...

x64 Assembly & Shellcoding 101

16 minute read

I have admittedly scoured the internet looking for examples of basic x64 shellcode development and have not had much luck. So many tutorials and lessons see...

Creative UAC Bypass Methods for the Modern Era

11 minute read

It’s been almost a year since my last post, and during that time I have acquired a strong interest in revisiting privilege escalation techniques for the mode...

Back to top ↑

elevationstation

Sending Sysmon Logs to Elastic ELK stack

1 minute read

Let’s pickup where we left off. If you haven’t done so already, please do check out the previous writeup on how to setup Elastic Stack, Logstash, and Kibana...

Installing Elastic Stack (ELK) from Scratch

3 minute read

Hey there red team….I mean BLUE TEAM cadet 😅 I don’t just focus on red team stuff you know…and it’s been long overdue that I do a writeup on not just red t...

Back to top ↑

metasploit

Create your own C2 using Python- Part 3

9 minute read

Twas 5 days before Christmas, and all through the night. Not a sound was heard, because we bypassed EDR with no alerts in sight! 🎅

Create your own C2 using Python- Part 2

7 minute read

Hey everyone! Welcome to Part 2 of the Create your own C2 series. You have likely learned by now this is not going to be some crazy beefed out C2. My main...

Create your own C2 using Python- Part 1

10 minute read

Back in days of my adolescence, I was fascinated with all things Metasploit. I was a ripe old teenager when Metasploit first came out, and I was enamored by...

Back to top ↑

Shellcoding

x64 Assembly & Shellcoding 101 - Conclusion

16 minute read

Well it’s been a fun ride, but we’ve reached our destination. 🚗 Time to wrap things up with our Assembly and Shellcoding 101 course and move on to the next e...

x64 Assembly & Shellcoding 101 - Part 6

7 minute read

Today is reverse shell day! I’m sure most of you were hoping we’d eventually be able to discuss writing a reverse shell using x64 assembly, and today just s...

x64 Assembly & Shellcoding 101 - Part 5

7 minute read

Well, you will all be happy to know I’m finally keeping my word and doing what I promised early on in the series…We’re going to do the following today:

x64 Assembly & Shellcoding 101 - Part 4

6 minute read

Hey all! This will be a shorter post today, so I’ll get right to it. Let’s talk shellcode basic encoding functionality built in to x64 assembly instruction...

x64 Assembly & Shellcoding 101 - Part 3

6 minute read

Now is the time for the expected continuation of part 1 of this blog series, where we clean up our code and remove those NULLs. In this way, we’ll be able t...

x64 Assembly & Shellcoding 101 - Part 2

3 minute read

Okay, I lied 😄 I thought I’d use part 2 to discuss removing NULL bytes, and that’s going to happen I promise! But I had some good feedback from the first p...

x64 Assembly & Shellcoding 101

16 minute read

I have admittedly scoured the internet looking for examples of basic x64 shellcode development and have not had much luck. So many tutorials and lessons see...

Back to top ↑

x64

x64 Assembly & Shellcoding 101 - Conclusion

16 minute read

Well it’s been a fun ride, but we’ve reached our destination. 🚗 Time to wrap things up with our Assembly and Shellcoding 101 course and move on to the next e...

x64 Assembly & Shellcoding 101 - Part 6

7 minute read

Today is reverse shell day! I’m sure most of you were hoping we’d eventually be able to discuss writing a reverse shell using x64 assembly, and today just s...

x64 Assembly & Shellcoding 101 - Part 5

7 minute read

Well, you will all be happy to know I’m finally keeping my word and doing what I promised early on in the series…We’re going to do the following today:

x64 Assembly & Shellcoding 101 - Part 4

6 minute read

Hey all! This will be a shorter post today, so I’ll get right to it. Let’s talk shellcode basic encoding functionality built in to x64 assembly instruction...

x64 Assembly & Shellcoding 101 - Part 3

6 minute read

Now is the time for the expected continuation of part 1 of this blog series, where we clean up our code and remove those NULLs. In this way, we’ll be able t...

x64 Assembly & Shellcoding 101 - Part 2

3 minute read

Okay, I lied 😄 I thought I’d use part 2 to discuss removing NULL bytes, and that’s going to happen I promise! But I had some good feedback from the first p...

x64 Assembly & Shellcoding 101

16 minute read

I have admittedly scoured the internet looking for examples of basic x64 shellcode development and have not had much luck. So many tutorials and lessons see...

Back to top ↑

x64dbg

x64 Assembly & Shellcoding 101 - Conclusion

16 minute read

Well it’s been a fun ride, but we’ve reached our destination. 🚗 Time to wrap things up with our Assembly and Shellcoding 101 course and move on to the next e...

x64 Assembly & Shellcoding 101 - Part 6

7 minute read

Today is reverse shell day! I’m sure most of you were hoping we’d eventually be able to discuss writing a reverse shell using x64 assembly, and today just s...

x64 Assembly & Shellcoding 101 - Part 5

7 minute read

Well, you will all be happy to know I’m finally keeping my word and doing what I promised early on in the series…We’re going to do the following today:

x64 Assembly & Shellcoding 101 - Part 4

6 minute read

Hey all! This will be a shorter post today, so I’ll get right to it. Let’s talk shellcode basic encoding functionality built in to x64 assembly instruction...

x64 Assembly & Shellcoding 101 - Part 3

6 minute read

Now is the time for the expected continuation of part 1 of this blog series, where we clean up our code and remove those NULLs. In this way, we’ll be able t...

x64 Assembly & Shellcoding 101 - Part 2

3 minute read

Okay, I lied 😄 I thought I’d use part 2 to discuss removing NULL bytes, and that’s going to happen I promise! But I had some good feedback from the first p...

x64 Assembly & Shellcoding 101

16 minute read

I have admittedly scoured the internet looking for examples of basic x64 shellcode development and have not had much luck. So many tutorials and lessons see...

Back to top ↑

nasm

x64 Assembly & Shellcoding 101 - Conclusion

16 minute read

Well it’s been a fun ride, but we’ve reached our destination. 🚗 Time to wrap things up with our Assembly and Shellcoding 101 course and move on to the next e...

x64 Assembly & Shellcoding 101 - Part 6

7 minute read

Today is reverse shell day! I’m sure most of you were hoping we’d eventually be able to discuss writing a reverse shell using x64 assembly, and today just s...

x64 Assembly & Shellcoding 101 - Part 5

7 minute read

Well, you will all be happy to know I’m finally keeping my word and doing what I promised early on in the series…We’re going to do the following today:

x64 Assembly & Shellcoding 101 - Part 4

6 minute read

Hey all! This will be a shorter post today, so I’ll get right to it. Let’s talk shellcode basic encoding functionality built in to x64 assembly instruction...

x64 Assembly & Shellcoding 101 - Part 3

6 minute read

Now is the time for the expected continuation of part 1 of this blog series, where we clean up our code and remove those NULLs. In this way, we’ll be able t...

x64 Assembly & Shellcoding 101 - Part 2

3 minute read

Okay, I lied 😄 I thought I’d use part 2 to discuss removing NULL bytes, and that’s going to happen I promise! But I had some good feedback from the first p...

x64 Assembly & Shellcoding 101

16 minute read

I have admittedly scoured the internet looking for examples of basic x64 shellcode development and have not had much luck. So many tutorials and lessons see...

Back to top ↑

assembly

x64 Assembly & Shellcoding 101 - Conclusion

16 minute read

Well it’s been a fun ride, but we’ve reached our destination. 🚗 Time to wrap things up with our Assembly and Shellcoding 101 course and move on to the next e...

x64 Assembly & Shellcoding 101 - Part 6

7 minute read

Today is reverse shell day! I’m sure most of you were hoping we’d eventually be able to discuss writing a reverse shell using x64 assembly, and today just s...

x64 Assembly & Shellcoding 101 - Part 5

7 minute read

Well, you will all be happy to know I’m finally keeping my word and doing what I promised early on in the series…We’re going to do the following today:

x64 Assembly & Shellcoding 101 - Part 4

6 minute read

Hey all! This will be a shorter post today, so I’ll get right to it. Let’s talk shellcode basic encoding functionality built in to x64 assembly instruction...

x64 Assembly & Shellcoding 101 - Part 3

6 minute read

Now is the time for the expected continuation of part 1 of this blog series, where we clean up our code and remove those NULLs. In this way, we’ll be able t...

x64 Assembly & Shellcoding 101 - Part 2

3 minute read

Okay, I lied 😄 I thought I’d use part 2 to discuss removing NULL bytes, and that’s going to happen I promise! But I had some good feedback from the first p...

x64 Assembly & Shellcoding 101

16 minute read

I have admittedly scoured the internet looking for examples of basic x64 shellcode development and have not had much luck. So many tutorials and lessons see...

Back to top ↑

debugging

x64 Assembly & Shellcoding 101 - Conclusion

16 minute read

Well it’s been a fun ride, but we’ve reached our destination. 🚗 Time to wrap things up with our Assembly and Shellcoding 101 course and move on to the next e...

x64 Assembly & Shellcoding 101 - Part 6

7 minute read

Today is reverse shell day! I’m sure most of you were hoping we’d eventually be able to discuss writing a reverse shell using x64 assembly, and today just s...

x64 Assembly & Shellcoding 101 - Part 5

7 minute read

Well, you will all be happy to know I’m finally keeping my word and doing what I promised early on in the series…We’re going to do the following today:

x64 Assembly & Shellcoding 101 - Part 4

6 minute read

Hey all! This will be a shorter post today, so I’ll get right to it. Let’s talk shellcode basic encoding functionality built in to x64 assembly instruction...

x64 Assembly & Shellcoding 101 - Part 3

6 minute read

Now is the time for the expected continuation of part 1 of this blog series, where we clean up our code and remove those NULLs. In this way, we’ll be able t...

x64 Assembly & Shellcoding 101 - Part 2

3 minute read

Okay, I lied 😄 I thought I’d use part 2 to discuss removing NULL bytes, and that’s going to happen I promise! But I had some good feedback from the first p...

x64 Assembly & Shellcoding 101

16 minute read

I have admittedly scoured the internet looking for examples of basic x64 shellcode development and have not had much luck. So many tutorials and lessons see...

Back to top ↑

red team

Back to top ↑

privilege escalation

Creative UAC Bypass Methods for the Modern Era

11 minute read

It’s been almost a year since my last post, and during that time I have acquired a strong interest in revisiting privilege escalation techniques for the mode...

Back to top ↑

malware

Malware EDR Evasion Techniques

8 minute read

Yo, how’s it going everyone. Sorry it’s been a while since my last post. Fear not, I’m geared up and ready to dive in to a full discussion on Malware evasi...

Back to top ↑

getsystem

Create your own C2 using Python- Part 3

9 minute read

Twas 5 days before Christmas, and all through the night. Not a sound was heard, because we bypassed EDR with no alerts in sight! 🎅

Back to top ↑

escalation

Back to top ↑

win32api

Back to top ↑

privesc

Back to top ↑

sockets

Create your own C2 using Python- Part 3

9 minute read

Twas 5 days before Christmas, and all through the night. Not a sound was heard, because we bypassed EDR with no alerts in sight! 🎅

Create your own C2 using Python- Part 2

7 minute read

Hey everyone! Welcome to Part 2 of the Create your own C2 series. You have likely learned by now this is not going to be some crazy beefed out C2. My main...

Create your own C2 using Python- Part 1

10 minute read

Back in days of my adolescence, I was fascinated with all things Metasploit. I was a ripe old teenager when Metasploit first came out, and I was enamored by...

Back to top ↑

psexec

Back to top ↑

elk

Sending Sysmon Logs to Elastic ELK stack

1 minute read

Let’s pickup where we left off. If you haven’t done so already, please do check out the previous writeup on how to setup Elastic Stack, Logstash, and Kibana...

Installing Elastic Stack (ELK) from Scratch

3 minute read

Hey there red team….I mean BLUE TEAM cadet 😅 I don’t just focus on red team stuff you know…and it’s been long overdue that I do a writeup on not just red t...

Back to top ↑

elastic

Sending Sysmon Logs to Elastic ELK stack

1 minute read

Let’s pickup where we left off. If you haven’t done so already, please do check out the previous writeup on how to setup Elastic Stack, Logstash, and Kibana...

Installing Elastic Stack (ELK) from Scratch

3 minute read

Hey there red team….I mean BLUE TEAM cadet 😅 I don’t just focus on red team stuff you know…and it’s been long overdue that I do a writeup on not just red t...

Back to top ↑

kibana

Sending Sysmon Logs to Elastic ELK stack

1 minute read

Let’s pickup where we left off. If you haven’t done so already, please do check out the previous writeup on how to setup Elastic Stack, Logstash, and Kibana...

Installing Elastic Stack (ELK) from Scratch

3 minute read

Hey there red team….I mean BLUE TEAM cadet 😅 I don’t just focus on red team stuff you know…and it’s been long overdue that I do a writeup on not just red t...

Back to top ↑

logstash

Sending Sysmon Logs to Elastic ELK stack

1 minute read

Let’s pickup where we left off. If you haven’t done so already, please do check out the previous writeup on how to setup Elastic Stack, Logstash, and Kibana...

Installing Elastic Stack (ELK) from Scratch

3 minute read

Hey there red team….I mean BLUE TEAM cadet 😅 I don’t just focus on red team stuff you know…and it’s been long overdue that I do a writeup on not just red t...

Back to top ↑

filebeats

Sending Sysmon Logs to Elastic ELK stack

1 minute read

Let’s pickup where we left off. If you haven’t done so already, please do check out the previous writeup on how to setup Elastic Stack, Logstash, and Kibana...

Installing Elastic Stack (ELK) from Scratch

3 minute read

Hey there red team….I mean BLUE TEAM cadet 😅 I don’t just focus on red team stuff you know…and it’s been long overdue that I do a writeup on not just red t...

Back to top ↑

threat hunting

Sending Sysmon Logs to Elastic ELK stack

1 minute read

Let’s pickup where we left off. If you haven’t done so already, please do check out the previous writeup on how to setup Elastic Stack, Logstash, and Kibana...

Installing Elastic Stack (ELK) from Scratch

3 minute read

Hey there red team….I mean BLUE TEAM cadet 😅 I don’t just focus on red team stuff you know…and it’s been long overdue that I do a writeup on not just red t...

Back to top ↑

blue team

Sending Sysmon Logs to Elastic ELK stack

1 minute read

Let’s pickup where we left off. If you haven’t done so already, please do check out the previous writeup on how to setup Elastic Stack, Logstash, and Kibana...

Installing Elastic Stack (ELK) from Scratch

3 minute read

Hey there red team….I mean BLUE TEAM cadet 😅 I don’t just focus on red team stuff you know…and it’s been long overdue that I do a writeup on not just red t...

Back to top ↑

winlogbeat

Sending Sysmon Logs to Elastic ELK stack

1 minute read

Let’s pickup where we left off. If you haven’t done so already, please do check out the previous writeup on how to setup Elastic Stack, Logstash, and Kibana...

Installing Elastic Stack (ELK) from Scratch

3 minute read

Hey there red team….I mean BLUE TEAM cadet 😅 I don’t just focus on red team stuff you know…and it’s been long overdue that I do a writeup on not just red t...

Back to top ↑

sysmon

Sending Sysmon Logs to Elastic ELK stack

1 minute read

Let’s pickup where we left off. If you haven’t done so already, please do check out the previous writeup on how to setup Elastic Stack, Logstash, and Kibana...

Installing Elastic Stack (ELK) from Scratch

3 minute read

Hey there red team….I mean BLUE TEAM cadet 😅 I don’t just focus on red team stuff you know…and it’s been long overdue that I do a writeup on not just red t...

Back to top ↑

C2

Create your own C2 using Python- Part 3

9 minute read

Twas 5 days before Christmas, and all through the night. Not a sound was heard, because we bypassed EDR with no alerts in sight! 🎅

Create your own C2 using Python- Part 2

7 minute read

Hey everyone! Welcome to Part 2 of the Create your own C2 series. You have likely learned by now this is not going to be some crazy beefed out C2. My main...

Create your own C2 using Python- Part 1

10 minute read

Back in days of my adolescence, I was fascinated with all things Metasploit. I was a ripe old teenager when Metasploit first came out, and I was enamored by...

Back to top ↑

Python

Create your own C2 using Python- Part 3

9 minute read

Twas 5 days before Christmas, and all through the night. Not a sound was heard, because we bypassed EDR with no alerts in sight! 🎅

Create your own C2 using Python- Part 2

7 minute read

Hey everyone! Welcome to Part 2 of the Create your own C2 series. You have likely learned by now this is not going to be some crazy beefed out C2. My main...

Create your own C2 using Python- Part 1

10 minute read

Back in days of my adolescence, I was fascinated with all things Metasploit. I was a ripe old teenager when Metasploit first came out, and I was enamored by...

Back to top ↑

custom

Create your own C2 using Python- Part 3

9 minute read

Twas 5 days before Christmas, and all through the night. Not a sound was heard, because we bypassed EDR with no alerts in sight! 🎅

Create your own C2 using Python- Part 2

7 minute read

Hey everyone! Welcome to Part 2 of the Create your own C2 series. You have likely learned by now this is not going to be some crazy beefed out C2. My main...

Create your own C2 using Python- Part 1

10 minute read

Back in days of my adolescence, I was fascinated with all things Metasploit. I was a ripe old teenager when Metasploit first came out, and I was enamored by...

Back to top ↑

DIY

Create your own C2 using Python- Part 3

9 minute read

Twas 5 days before Christmas, and all through the night. Not a sound was heard, because we bypassed EDR with no alerts in sight! 🎅

Create your own C2 using Python- Part 2

7 minute read

Hey everyone! Welcome to Part 2 of the Create your own C2 series. You have likely learned by now this is not going to be some crazy beefed out C2. My main...

Create your own C2 using Python- Part 1

10 minute read

Back in days of my adolescence, I was fascinated with all things Metasploit. I was a ripe old teenager when Metasploit first came out, and I was enamored by...

Back to top ↑

command and control

Create your own C2 using Python- Part 3

9 minute read

Twas 5 days before Christmas, and all through the night. Not a sound was heard, because we bypassed EDR with no alerts in sight! 🎅

Create your own C2 using Python- Part 2

7 minute read

Hey everyone! Welcome to Part 2 of the Create your own C2 series. You have likely learned by now this is not going to be some crazy beefed out C2. My main...

Create your own C2 using Python- Part 1

10 minute read

Back in days of my adolescence, I was fascinated with all things Metasploit. I was a ripe old teenager when Metasploit first came out, and I was enamored by...

Back to top ↑

bitwise

Malware EDR Evasion Techniques

8 minute read

Yo, how’s it going everyone. Sorry it’s been a while since my last post. Fear not, I’m geared up and ready to dive in to a full discussion on Malware evasi...

Back to top ↑

encoding

Malware EDR Evasion Techniques

8 minute read

Yo, how’s it going everyone. Sorry it’s been a while since my last post. Fear not, I’m geared up and ready to dive in to a full discussion on Malware evasi...

Back to top ↑

author

Introductions

1 minute read

I currently serve in a senior management infosec role. I started out as a network admin, then eventually landed a gig as Senior security analyst. Not long af...

Back to top ↑

personal

Introductions

1 minute read

I currently serve in a senior management infosec role. I started out as a network admin, then eventually landed a gig as Senior security analyst. Not long af...

Back to top ↑

Introductions

Introductions

1 minute read

I currently serve in a senior management infosec role. I started out as a network admin, then eventually landed a gig as Senior security analyst. Not long af...

Back to top ↑

dll injection

Back to top ↑

hashdump

Back to top ↑

thumbdrive

Back to top ↑

SAM

Back to top ↑

SECURITY

Back to top ↑

SYSTEM

Back to top ↑

registry hive

Back to top ↑

xor

Back to top ↑

shift right

Back to top ↑

shift left

Back to top ↑

and

Back to top ↑

or

Back to top ↑

encryption

Back to top ↑

shellcode

Back to top ↑

threading

Back to top ↑

netcat

Back to top ↑

server

Back to top ↑

python

Back to top ↑

client

Back to top ↑

AV

Back to top ↑

EDR

Back to top ↑

EDR bypass

Malware EDR Evasion Techniques

8 minute read

Yo, how’s it going everyone. Sorry it’s been a while since my last post. Fear not, I’m geared up and ready to dive in to a full discussion on Malware evasi...

Back to top ↑

AV bypass

Malware EDR Evasion Techniques

8 minute read

Yo, how’s it going everyone. Sorry it’s been a while since my last post. Fear not, I’m geared up and ready to dive in to a full discussion on Malware evasi...

Back to top ↑

jscript

Malware EDR Evasion Techniques

8 minute read

Yo, how’s it going everyone. Sorry it’s been a while since my last post. Fear not, I’m geared up and ready to dive in to a full discussion on Malware evasi...

Back to top ↑

wscript

Malware EDR Evasion Techniques

8 minute read

Yo, how’s it going everyone. Sorry it’s been a while since my last post. Fear not, I’m geared up and ready to dive in to a full discussion on Malware evasi...

Back to top ↑

cscript

Malware EDR Evasion Techniques

8 minute read

Yo, how’s it going everyone. Sorry it’s been a while since my last post. Fear not, I’m geared up and ready to dive in to a full discussion on Malware evasi...

Back to top ↑

obfuscate

Malware EDR Evasion Techniques

8 minute read

Yo, how’s it going everyone. Sorry it’s been a while since my last post. Fear not, I’m geared up and ready to dive in to a full discussion on Malware evasi...

Back to top ↑

XOR

Malware EDR Evasion Techniques

8 minute read

Yo, how’s it going everyone. Sorry it’s been a while since my last post. Fear not, I’m geared up and ready to dive in to a full discussion on Malware evasi...

Back to top ↑

NTLMv2

Back to top ↑

hashes

Back to top ↑

Responder

Back to top ↑

Outlook

Back to top ↑

foothold

Back to top ↑

smb

Back to top ↑

llmnr

Back to top ↑

mdns

Back to top ↑

nbns

Back to top ↑

UAC Bypass

Creative UAC Bypass Methods for the Modern Era

11 minute read

It’s been almost a year since my last post, and during that time I have acquired a strong interest in revisiting privilege escalation techniques for the mode...

Back to top ↑

Windows 11

Creative UAC Bypass Methods for the Modern Era

11 minute read

It’s been almost a year since my last post, and during that time I have acquired a strong interest in revisiting privilege escalation techniques for the mode...

Back to top ↑

ctfmon

Creative UAC Bypass Methods for the Modern Era

11 minute read

It’s been almost a year since my last post, and during that time I have acquired a strong interest in revisiting privilege escalation techniques for the mode...

Back to top ↑

UI Access

Creative UAC Bypass Methods for the Modern Era

11 minute read

It’s been almost a year since my last post, and during that time I have acquired a strong interest in revisiting privilege escalation techniques for the mode...

Back to top ↑

token manipulation

Creative UAC Bypass Methods for the Modern Era

11 minute read

It’s been almost a year since my last post, and during that time I have acquired a strong interest in revisiting privilege escalation techniques for the mode...

Back to top ↑

MSI

Back to top ↑

arbitrary write

Back to top ↑

CVE-2024-50804

Back to top ↑

migrate

Create your own C2 using Python- Part 3

9 minute read

Twas 5 days before Christmas, and all through the night. Not a sound was heard, because we bypassed EDR with no alerts in sight! 🎅

Back to top ↑

uac bypass

Create your own C2 using Python- Part 3

9 minute read

Twas 5 days before Christmas, and all through the night. Not a sound was heard, because we bypassed EDR with no alerts in sight! 🎅

Back to top ↑