My First Dive into EPROCESS: ProcessSelfDelete research
Exploring the EPROCESS structure on Windows 11 24H2, with a focus on the mysterious ProcessSelfDelete flag, how it’s activated, its effects on process termin...
Exploring the EPROCESS structure on Windows 11 24H2, with a focus on the mysterious ProcessSelfDelete flag, how it’s activated, its effects on process termin...
Exploiting a subtle kernel vulnerability in AFD.sys by leveraging I/O Rings to build arbitrary read and write primitives for reliable privilege escalation on...
Leveraging Windows Sandbox and QEMU virtualization to safely deploy payloads, conduct penetration tests, and enhance red team operational stealth
Exploring stealthy webshell techniques in PHP, ASPX, and Java to bypass security measures and maintain persistence
Evading Event Tracing for Windows (ETW)-based detections with methods such as patching, tampering and session hijacking
Investigating custom shellcode creation on x64 Windows architectures, also understanding the calling convention in order to obtain a reverse shell