Irfan FarooqExecuting Shellcode in Remote ProcessHello everyone I am Irfan and today, let’s delve into the topic of executing shellcode in Remote Process. So, let’s get started and explore…3 min read·2 days ago--
Pradip Dey (Bunny)CozyHosting (HackTheBox) WriteupThe “CozyHosting” machine is created by “commandercool”. This is an easy machine with a strong focus on web application security…5 min read·Sep 16--
Cory DoctorowRed-teaming the SCOTUS code of conductLet’s take a look at what it *actually* prohibits.7 min read·Nov 17--2--2
Irfan FarooqWindows persistence through backdoor servicesHello, everyone! I’m Irfan, and today, let’s delve into the topic of achieving Windows persistence through backdoor services. So, let’s get…2 min read·Nov 26----
Angelo Pio AmiranteMalware Development: Windows Defender EvasionThis article will show you how to create a dropper that evades Windows Defender. This article is part of a series, if you haven’t read the…7 min read·Nov 20----
Irfan FarooqExecuting Shellcode in Remote ProcessHello everyone I am Irfan and today, let’s delve into the topic of executing shellcode in Remote Process. So, let’s get started and explore…3 min read·2 days ago--
Pradip Dey (Bunny)CozyHosting (HackTheBox) WriteupThe “CozyHosting” machine is created by “commandercool”. This is an easy machine with a strong focus on web application security…5 min read·Sep 16--
Cory DoctorowRed-teaming the SCOTUS code of conductLet’s take a look at what it *actually* prohibits.7 min read·Nov 17--2
Irfan FarooqWindows persistence through backdoor servicesHello, everyone! I’m Irfan, and today, let’s delve into the topic of achieving Windows persistence through backdoor services. So, let’s get…2 min read·Nov 26--
Angelo Pio AmiranteMalware Development: Windows Defender EvasionThis article will show you how to create a dropper that evades Windows Defender. This article is part of a series, if you haven’t read the…7 min read·Nov 20--
Me, Just a Techie.Pentesting: I wanna be a hackerrr…No, it’s not about testing writing pens/pencils. It’s harder than that.10 min read·Nov 11--
Chenny RenUnveiling the Cunning: A Demo of Google Calendar RAT Exploiting Calendar Service for C2 OperationsIn a recent discovery that sounds more like Hollywood fiction than reality, attackers have been found using Google Calendar as a Command…5 min read·Nov 8--3
Irfan FarooqExecuting Shellcode in Remote ProcessHello everyone I am Irfan and today, let’s delve into the topic of executing shellcode in Remote Process. So, let’s get started and explore…3 min read·2 days ago----
Malik Haider AliUser ID controlled by request parameter: A portswigger lab’s reportAccess the lab from the website and login with the given credentials.2 min read·4 days ago----
Irfan FarooqWindows persistence through backdoor servicesHello, everyone! I’m Irfan, and today, let’s delve into the topic of achieving Windows persistence through backdoor services. So, let’s get…2 min read·Nov 26----
Angelo Pio AmiranteMalware Development: Windows Defender EvasionThis article will show you how to create a dropper that evades Windows Defender. This article is part of a series, if you haven’t read the…7 min read·Nov 20----
Cory DoctorowRed-teaming the SCOTUS code of conductLet’s take a look at what it *actually* prohibits.7 min read·Nov 17--2--2