Alternative ways for EDR Silencing
Assigning secondary IP addresses and IPSec filter rules to block EDR communication
Assigning secondary IP addresses and IPSec filter rules to block EDR communication
Showing several approaches to decompile and analyze newer python versions compiled with pyinstaller
Explaining the theory and the practical steps to exploit drivers which give access to the WRMSR instruction
Exploiting CVE-2019-16098 to steal a token
Driver basics and CVE-2019-16098
Configuring environment for kernel debugging
Analysis of the EKANS ransomware
My writeups for the FlareOn 2019 challenges
My writeups for the FlareOn 2019 challenges
A specific case of bypassing a firewall