|
You are here |
redteaming.co.uk | ||
| | | | |
thewover.github.io
|
|
| | | | | TLDR: Presenting DInvoke, a new API in SharpSploit that acts as a dynamic replacement for PInvoke. Using it, we show how to dynamically invoke unmanaged code from memory or disk while avoiding API Hooking and suspicious imports. | |
| | | | |
bohops.com
|
|
| | | | | Introduction In recent years, there have been numerous published techniques for evading endpoint security solutions and sources such as A/V, EDR and logging facilities. The methods deployed to achieve the desired result usually differ in sophistication and implementation, however, effectiveness is usually the end goal (of course, with thoughtful consideration of potential tradeoffs). Defenders can... | |
| | | | |
bc-security.org
|
|
| | | | | [AI summary] The article discusses a technique called ScriptBlock Smuggling that allows attackers to spoof PowerShell security logs and bypass AMSI without reflection or patching, enabling stealthier cyber attacks. | |
| | | | |
www.thezdi.com
|
|
| | | [AI summary] A vulnerability in VMware Aria Operations for Logs allows remote code execution via insecure deserialization, patched in April 2023. | ||