Virtualization Tactics in Red Team Operations
Leveraging Windows Sandbox and QEMU virtualization to safely deploy payloads, conduct penetration tests, and enhance red team operational stealth
Leveraging Windows Sandbox and QEMU virtualization to safely deploy payloads, conduct penetration tests, and enhance red team operational stealth
Exploring stealthy webshell techniques in PHP, ASPX, and Java to bypass security measures and maintain persistence
Evading Event Tracing for Windows (ETW)-based detections with methods such as patching, tampering and session hijacking
Investigating custom shellcode creation on x64 Windows architectures, also understanding the calling convention in order to obtain a reverse shell