Brendan OrtizinIndependent Security EvaluatorsCreating AV Resistant Malware — Part 1Recently, I have been preparing for my eCTPXv2 certification from eLearnSecurity. The certification course covers a lot of advanced topics…Dec 1, 20201Dec 1, 20201
Brendan OrtizinIndependent Security EvaluatorsCreating AV Resistant Malware — Part 2In part two of this series we’re going to be creating the AV destroyer part of our malware! It will be based off of Rasta-mouse’s…Dec 1, 2020Dec 1, 2020
Brendan OrtizinIndependent Security EvaluatorsCreating AV Resistant Malware — Part 3In part 3 of this series we will be covering creating another malicious DLL that we will load into memory using PowerShell’s reflection…Dec 1, 2020Dec 1, 2020
Brendan OrtizinIndependent Security EvaluatorsCreating AV Resistant Malware — Part 4The final part of this blog series will be a short tutorial of how to use your new tools and how to tie it all together to get a reverse…Dec 1, 2020Dec 1, 2020
Brendan OrtizinIndependent Security EvaluatorsUser Information Disclosure in Dating AppsExtracting user data from mobile apps to craft exploits.Nov 14, 2020Nov 14, 2020
Brendan OrtizinIndependent Security EvaluatorsA Hack the Box Walkthrough — ResoluteI will cover the methodology I used solving Hack The Box challenge on the “Resolute” box. Enumeration to improper access controls for…Jun 19, 2020Jun 19, 2020