One ring to rule them all
Home About Posts ContactNew posts will be published in my new blog
Explaining the theory and the practical steps to exploit drivers which give access to the WRMSR instruction
Exploiting CVE-2019-16098 to steal a token
Driver basics and CVE-2019-16098
Configuring environment for kernel debugging
Analysis of the EKANS ransomware
My writeups for the FlareOn 2019 challenges
My writeups for the FlareOn 2019 challenges
A specific case of bypassing a firewall
Microsfot fixed their detection logic, so this doesn't work anymore.
A research on why the new defender evasion modules fail to evade
When attackers have arbitrary file read access to a Linux machine, they can leverage the /proc filesystem for enumeration
A second look at the arcane art of shellcode writing
I think the title is self-explanatory.
Analysis of the Petya/NotPetya ransomware.
A PoC for hiding data in HTTP headers.
Cmubomb challenge writeup from the Modern Binary Exploitation course.
Bomb challenge writeup from the Modern Binary Exploitation course.
Crackme challenges writeup from the Modern Binary Exploitation course.
Introduction to the arcane art of shellcode writing.
The first part of a series of posts about encryption.