top of page

Search


Stealth Syscall Execution: Bypassing ETW, Sysmon, and EDR Detection
Stealth syscalls: Because life's too short to argue with an angry EDR! Introduction System calls (syscalls) serve as the bridge between...
Apr 1016 min read
6,271 views


Exploring Heap Exploitation Mechanisms: Understanding the House of Force Technique
Heap exploitation techniques like House of Force demonstrate the complexities and risks associated with memory management systems.
Jan 1515 min read
3,991 views


Crowdstrike Outage: Critical Services Impacted
Windows users have encountered a significant outage, part of a global outage. On July 19, 2024, Crowdstrike users experienced outage
Jul 19, 20244 min read
1,040 views


Demystifying Hollow Process Injection
Unlike process injection, hollow process injection suspends a legitimate process, overwrites its existing code section with malicious code,
May 1, 20246 min read
3,215 views


Deep Dive into Penetration Testing Methodologies
Penetration testing: deep diving into cybersecurity's abyss, where bugs are the new buried treasure and the sharks are wired....
Apr 11, 20243 min read
406 views
Blog Categories
bottom of page