29 тысяч подписчиков
5 видео
Create your own linux malware | Simple reverse shell | Series - Crafting linux malware
Dumping lsass | Bypassing LSA Protection - PPLFault | Windows 11
Pushing boundaries with Love.exe | Boot persistent trigger for execution
Cobalt Strike | bypassing defender | Evasion method PoC by Aibel Aju
sector-C31 | Gateway to forward local port via cloud vps | By AuxGrep
Backdooring Windows Login | Implanting via boot process - fake chkdsk screen
Love.exe | Windows UAC Bypass | Fully Undetectable - Zero Behaviour Detection
Offensive Nim to Powershell | Getting interactive pty reverse shell | Bypassing Defender
iSCSI UAC Bypass | Abusing AutoElevate - DLL Proxying | DLL Search Order hijacking
Creating a Word Exploit | Bypassing Defender | Getting reverse shell
Cobalt Strike - Obfuscating JScript Payload | Spawning reverse shell | Evading Windows Defender
Leveraging UAC Bypass via Event Viewer to DNS Poisoning | PoC by AuxGrep
HiveNightmare (SeriousSAM ) | Reading registry - Local Privilege Escalation | CVE-2021-36934
Apache Server Zero Day | Exploiting Live Target
UAC Bypass via Event Viewer | .NET Deserialization
CVE-2021-24084 | Windows MDM Local Privilege Escalation Zero Day | Unpatched Since 2020
This is how you can order free milk | Hijacking user accounts | Bypassing otp login | Doodhvale
PE Backdooring | Injecting stageless shellcode into an executable | Malware development
Privilege Escalation Windows 10 | Antivirus Bypass | Dump NTLM hashes
InvisibilityCloak | Bypassing Signature based Detection | Antivirus Bypass | C#
Dumping lsass Service and Extracting Juicy Information from the memory | windows
Windows 11 UAC Bypass to Local Privilege Escalation
Spring4shell | Remote code execution in spring java framework | CVE-2022-22965
ret2shellcode | Stack Buffer Overflow | Basic ROP - Binary Exploitation
CVE-2022-21882 | Windows win32k Local Privilege Escalation | A Bypass of CVE-2021-1732
Log4Shell vulnerability | 0 Day RCE exploit in Java logging library log4j2 | CVE-2021-44228
Creating Malicious Word File | This is how cyber criminals target using innocent looking document