Fabian LimMy Review on OSEP (PEN-300 2024)Hi all! Its been quite a while, since I have posted anything here! Its been a hectic 2 months 😖, but I’m happy to share I am officially…Jul 212
LsecCreating Fully Undetectable Payload (FUD) with CWelcome back my red teamers! Today’s blog is exciting because I personally did not expect such high result at evading AV vendors!Oct 26, 20221
InInfoSec Write-upsbyRavishanka SilvaFlying Under the AV Radar — Part 01After a months of research, I decided to bring some articles on evading Anti-Virus software. This is the first article of the series and…Dec 22, 2023Dec 22, 2023
Hossam EhabAV/EDR Evasion | Malware DevelopmentHello! Welcome to our thrilling playlist dedicated to understanding the art of evading anti-virus solutions. Have you ever wondered how…Feb 17, 20231Feb 17, 20231
Ba AnasxsStealth Symphony: Unveiling Untraceable Windows Reverse Shells with NimHello, Cyber Sleuths! Today, we’re taking a peek into Nim Reverse Shell developed by Sn1r, a nifty Windows reverse shell making waves in…Nov 10, 2023Nov 10, 2023
Fabian LimMy Review on OSEP (PEN-300 2024)Hi all! Its been quite a while, since I have posted anything here! Its been a hectic 2 months 😖, but I’m happy to share I am officially…Jul 212
LsecCreating Fully Undetectable Payload (FUD) with CWelcome back my red teamers! Today’s blog is exciting because I personally did not expect such high result at evading AV vendors!Oct 26, 20221
InInfoSec Write-upsbyRavishanka SilvaFlying Under the AV Radar — Part 01After a months of research, I decided to bring some articles on evading Anti-Virus software. This is the first article of the series and…Dec 22, 2023
Hossam EhabAV/EDR Evasion | Malware DevelopmentHello! Welcome to our thrilling playlist dedicated to understanding the art of evading anti-virus solutions. Have you ever wondered how…Feb 17, 20231
Ba AnasxsStealth Symphony: Unveiling Untraceable Windows Reverse Shells with NimHello, Cyber Sleuths! Today, we’re taking a peek into Nim Reverse Shell developed by Sn1r, a nifty Windows reverse shell making waves in…Nov 10, 2023
LsecEncrypting Shellcode with XOR | Offensive coding in CHello fellow red teamers. One of the techniques for AV evasion is encryption. While there are many, many encrypting algorightms, XOR is…Nov 1, 20221
Echo_SlowProcess Injection Series Part III: APC InjectionUsing MITRE technique T1055.004 to bypass Windows Defender.Oct 6, 2023
Hossam EhabAV/EDR Evasion | Malware Development — P2Hello, We talked in the first part of the writeup some basics like how av detect malwares, what is evasion techniques, and we make a small…Feb 18, 20231