top of page

Search

Stealth Syscall Execution: Bypassing ETW, Sysmon, and EDR Detection
Stealth syscalls: Because life's too short to argue with an angry EDR! Introduction System calls (syscalls) serve as the bridge between...
6 days ago16 min read
117 views

Exploring Heap Exploitation Mechanisms: Understanding the House of Force Technique
Heap exploitation techniques like House of Force demonstrate the complexities and risks associated with memory management systems.
Jan 1515 min read
3,140 views

Crowdstrike Outage: Critical Services Impacted
Windows users have encountered a significant outage, part of a global outage. On July 19, 2024, Crowdstrike users experienced outage
Jul 19, 20244 min read
1,030 views

Demystifying Hollow Process Injection
Unlike process injection, hollow process injection suspends a legitimate process, overwrites its existing code section with malicious code,
May 1, 20246 min read
3,006 views

Deep Dive into Penetration Testing Methodologies
Penetration testing: deep diving into cybersecurity's abyss, where bugs are the new buried treasure and the sharks are wired....
Apr 11, 20243 min read
366 views
Blog Categories
bottom of page