Abusing OG Protocol With Macros
Disclaimer: This post is for educational and informational purposes only. It is intended to raise awareness about how certain technologies work and should not be used for any malicious or unethica...
Disclaimer: This post is for educational and informational purposes only. It is intended to raise awareness about how certain technologies work and should not be used for any malicious or unethica...
Introduction In this blog post, I’ll explore how adversaries conceal their shellcode inside Portable Executable (PE) files—particularly in sections like .rsrc—to evade Endpoint Detection and Respon...
Introduction I would like to write a write-up about a machine I solved on TryHackMe called Vulnnet:Roasted, which is an Active Directory machine. My focus will not be on how I solved the machine, b...
بسم الله الرحمن الرحيم It’s been a long time since I posted any write-ups here. In this post, I would like to share with you a machine I solved on TryHackMe related to Active Directory called “Res...