|
You are here |
theevilbit.github.io | ||
| | | | |
www.malwaretech.com
|
|
| | | | | Understanding the basics of user mode EDR hooking, common bypass techniques, and their limitations. | |
| | | | |
modexp.wordpress.com
|
|
| | | | | Introduction Quick post about Windows System calls that I forgot about working on after the release of Dumpert by Cn33liz last year, which is described in this post. Typically, EDR and AV set hooks on Win32 API or NT wrapper functions to detect and mitigate against malicious activity. Dumpert attempts to bypass any user-level hooks... | |
| | | | |
mdanilor.github.io
|
|
| | | | | A beginers guide into a Windows kernel stack overflow vulnerability from zero to advanced bypasses. | |
| | | | |
www.da.vidbuchanan.co.uk
|
|
| | | [AI summary] A detailed writeup of a cryptographic side-channel attack challenge from the UofTCTF where the author exploits timing variations in an AES decryption implementation to recover the flag. | ||