PinnedPublished inInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 1My learnings on how the different steps in EDR and Antivirus techniques are used in the field.Oct 29, 2023Oct 29, 2023
PinnedPublished inInfoSec Write-upsStealthy Persistence While Using Windows Terminal.By misusing the setting fileNov 9, 2022Nov 9, 2022
Published inInfoSec Write-upsPenetration testing a Kubernetes environmentSearching for weaknesses in the configuration.Feb 24Feb 24
Published inInfoSec Write-upsSecuring your malware from being hookedBy only allowing Microsoft signed DLL'sDec 23, 2023Dec 23, 2023
Published inInfoSec Write-upsEvading Detection With Nmap Part 2Analyzing how Nmap -sV probes give your assessment awayNov 29, 20231Nov 29, 20231
Published inInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 3Reading into Direct Syscalls with Syswhispers.Nov 21, 2023Nov 21, 2023
Published inInfoSec Write-upsEvading Detection while using nmapUnderstanding how nmaplowercheck will give you awayNov 17, 2023Nov 17, 2023
Published inInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 2Common techniques for performing sandbox and Virtualmachine evasion by AV and EDRNov 11, 2023Nov 11, 2023
Published inInfoSec Write-upsTaking your web application pentesting to another levelBy making use of Bchecks in Burp suiteAug 13, 2023Aug 13, 2023
Published inInfoSec Write-upsRewriting IP for filter bypassIpv4 addresses are built as 4 blocks of integers which can range from 0 to 255. If we want to ping localhost we are used to write 127.0.0.1…Aug 10, 2023Aug 10, 2023
Securing WordPress websites A defined guide part 1Securing it by using .htaccessMar 29, 2023Mar 29, 2023
Misusing Azure to get pre-login system shell on your managed deviceand how you can disable the Bitlocker Recovery key visibility in Azure.Feb 16, 2023Feb 16, 2023
Published inInfoSec Write-upsBug Bounty Tips and Getting Persistence With Electron ApplicationsBy repacking asar files, electron applications, and other bug bounty tips. Starring Signal, Discord, Nordpass, and moreNov 22, 2022Nov 22, 2022
Published inInfoSec Write-upsDLL Hijacking Persistence Using DiscordHow old hacking techniques like DLL Hijacking still work in the present day and how you can find them yourself.Nov 16, 20222Nov 16, 20222
Getting Stealthy Persistence Using Visual Studio CodeBy misusing the settings fileNov 12, 2022Nov 12, 2022
Getting persistence using Git bashGething persistence with the windows terminal made me eager to search for more possible persistence methods. Being a full time software…Nov 11, 2022Nov 11, 2022
How I could have been the administrator for all Dutch companies and create invoices and still can…This is how I got administrator rights for all Dutch companies with the ability to write invoices on a Dutch government agency application.Nov 3, 2022Nov 3, 2022