PinnedPublished inOSINT TeamShadows of LSASS Dumping: Evasion Techniques and the Ongoing Struggle of EDR Solutions to Defend a…Blog Summary:Apr 29Apr 29
PinnedPublished inSystem WeaknessArsenal: Bypass EDR’s/XDR’s and make malware analysis harder(Direct Syscalls, Sandbox Bypass, API Hashing, AES Encryption)Apr 1, 2022A response icon1Apr 1, 2022A response icon1
Published inSystem WeaknessBYOVD A Kernel Attack: Stealthy Threat to Endpoint SecurityIntroduction:Aug 9, 2024Aug 9, 2024
Published inSystem WeaknessPEB Walk: Avoid API calls inspection in IAT by analyst and bypass static detection of…SummaryJul 26, 2024Jul 26, 2024
Published inOSINT TeamArsenal 2.0: Elevating Malware Stealth Tactics to bypass static detectionNote: This blog is an extension of my previous post, “Arsenal: Bypass EDR’s/XDR’s and make malware analysis harder.” In this follow-up, i…Jul 26, 2024Jul 26, 2024
Published inOSINT TeamUnveiling the Intricacies of AsyncRAT: A deployment in Colombia by the Blind Eagle Cyber GroupIntroductionJan 8, 2024Jan 8, 2024
Published inOSINT TeamUnveiling the Intricacies of SamSam Ransomware: A Comprehensive Analysis Plus Proactive Threat…IntroductionNov 23, 2023A response icon1Nov 23, 2023A response icon1
Published inSystem WeaknessDark Crystel RAT (DCrat)Detailed AnalysisMulti-StageSep 25, 2023Sep 25, 2023
Published inSystem WeaknessOn-Disk Detection: Bypass AV’s/EDR’s using syscalls with legacy instruction, series of instructions…Hi everyone, today I am going to explain some techniques to bypass AV/EDR’s static as well as dynamic detection. The main focus is to…Apr 11, 2022Apr 11, 2022
Published inSystem WeaknessEASE POST-EXPLOITATION: Getting elevated reverse shell using DLL Hijacking and Mock DirectoriesThis blog is about DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged…Mar 24, 2022Mar 24, 2022