-
Bypass Windows Defender Attack Surface Reduction
A redteam oriented study of Windows Defender Exploit Guard Attack Surface Reduction. Analysis of several rules, what triggers them and how to...Continue reading →
D 24 February 2019 A Emeric Nasi C 1 messages -
Yet another sdclt UAC bypass
Fileless UAC bypass via COM hijack using sdtlc.exe auto-elevated process.Continue reading →
D 23 January 2019 A Emeric Nasi C 1 messages -
Advanced USB key phishing
How to create "trojanized" USB key for redteam/social engineering using ADS, shortcuts, HTA, macro_pack, etc. Drop DLL payload with stealth, no knowledge of target...Continue reading →
D 23 June 2018 A Emeric Nasi C 0 messages
Search
Most popular
3. VNC to access Kali Linux on Raspberry Pi
5. Digging passwords in Linux swap
5 random articles
1. Hide meterpreter shellcode in executable
2. cve-2014-9322 Linux Kernel D.O.S POC
3. POSIX file capabilities, the dark side
4. Modify any Java class field using reflection.
Sponsor
If you appreciate my work, you may help or reward with a contribution :)