top of page

Search


The Only JWT Security Guide You Will Ever Need
The Ultimate guide to Breaking JWT, JWT are primarily used for authentication & authorization almost everywhere in modern web. JWTs can possess security vulnerabilities if configured and implemented improperly, potentially causing havoc. Thus, understanding how JWTs work and how they might fail is critical when securing systems that leverage JWTs.
Sep 24, 202517 min read
Â
Â


Stealth Syscall Execution: Bypassing ETW, Sysmon, and EDR Detection
Stealth Syscalls: Because Life's Too Short to Argue with an Angry EDR! Introduction to Stealth Syscalls System calls (syscalls) serve as the bridge between user-mode processes and the Windows kernel. They facilitate crucial tasks such as memory management, file operations, and process creation. Security tools like Event Tracing for Windows (ETW), Sysmon, and debuggers such as x64dbg and WinDbg actively monitor these interactions to detect malicious or anomalous syscall execut
Apr 10, 20256 min read
Â
Â


Demystifying Hollow Process Injection
Unlike process injection, hollow process injection suspends a legitimate process, overwrites its existing code section with malicious code,
May 1, 20247 min read
Â
Â
Blog Categories
bottom of page