top of page

Search


Stealth Syscall Execution: Bypassing ETW, Sysmon, and EDR Detection
Stealth Syscalls: Because Life's Too Short to Argue with an Angry EDR! Introduction to Stealth Syscalls System calls (syscalls) serve as the bridge between user-mode processes and the Windows kernel. They facilitate crucial tasks such as memory management, file operations, and process creation. Security tools like Event Tracing for Windows (ETW), Sysmon, and debuggers such as x64dbg and WinDbg actively monitor these interactions to detect malicious or anomalous syscall execut
Apr 10, 20256 min read


Demystifying Hollow Process Injection
Unlike process injection, hollow process injection suspends a legitimate process, overwrites its existing code section with malicious code,
May 1, 20247 min read


What is a honeypot and how does it work?
Honeypots is catfishing in the world of cybersecurity – no candlelit dinners, just firewalls and encrypted love letters to trap hackers! Introduction In the ever-evolving landscape of cybersecurity, staying one step ahead of malicious actors is not just a challenge but a necessity. Cyberattacks continue to grow in sophistication, making it vital for security professionals to employ innovative strategies for detection and defense. One such method of prominence is honeypots. W
Jan 3, 20248 min read
Blog Categories
bottom of page