RSS.Social

lolcads tech blog

follow: @[email protected]

Posts

How to build a high-performance network fuzzer with LibAFL and libdesock

Outsmarting the Watchdog: How can Adversaries evade Sigma Rule Detection during a Kerberos Golden Ticket Attack?

coderec: Detecting Machine Code in Binary Files

Towards utilizing BTF Information in Linux Memory Forensics

Adversary Emulation is a Complicated Profession - Intelligent Cyber Adversary Emulation with the Bounty Hunter

Bytecode Reuse Attack (Part 4)

Bytecode Injection (Part 3)

Fundamentals for Bytecode Exploitation (Part 2)

Introduction to Android Bytecode Exploitation (Part 1)

Timing Attack Experiments against Scudo (Part 2)

Scudo, the Allocator (Part 1)

E²VA: Use After Free Write/Execute Module (Part 4)

E²VA: Stack Buffer Overflow Module (Part 3)

E²VA: Android Basics (Part 2)

*PowerView* is evil, but *PowerVi* and *ew* are legit, right? - Missing signature-based detections due to PowerShell Script Block Logging Fragmentation

BPF Memory Forensics with Volatility 3

Diving into the art of userspace exploitation under Android - Introducing E²VA (Part 1)

friTap - Decrypting TLS on the fly

Make Frida Great Again

Exploration of the Dirty Pipe Vulnerability (CVE-2022-0847)

Exploiting CVE-2021-43247

Installing new .NET versions on a Windows 7 VM

libdesock

About

About

Contact