|
You are here |
thinkdfir.com | ||
| | | | |
pentestlab.blog
|
|
| | | | | 1 post published by Administrator on November 13, 2019 | |
| | | | |
cocomelonc.github.io
|
|
| | | | | [AI summary] The author demonstrates a technical deep dive into Windows malware persistence by creating and executing a script that registers a malicious application to run during user login via registry keys. | |
| | | | |
ogmini.github.io
|
|
| | | | | Messing around with Windows Defender just to download and execute LaZagne locally leaves artifacts behind related to exclusions. There are of course other more stealthy ways to run LaZagne by using RATs such as Pupy or Meterpreter/Metasploit. This post will list out the Registry Keys and Event Logs related to Windows Defender. | |
| | | | |
shoalmontgames.com
|
|
| | | Date: 4/13/2023Characters: Lorne, Varg Varg follows the trail left by Gerald and Lorne, making his way into the cave. Lorne licks a toad, starts hallucinating. Varg also licks the toad. The six corpses are singing, now they can see both the corpses and also the spirits which appear as they did in life. The spirits... | ||