Unveiling Windows Services: The Hidden Engines of Your OSOnce upon a time in the vast digital kingdom of Windows, there existed a special breed of applications known as Windows Services. Unlike…Oct 24Oct 24
When USBs Attack: Exploring the Underbelly of Malicious LNK FilesA USB (Universal Serial Bus) device is a standardized interface used for communication between computers and peripherals such as storage…Oct 131Oct 131
Whispers in the Code: Inter Process Communication (IPC) and Named Pipes For Covert C2Inter-Process Communication (IPC) refers to mechanisms that allow processes to communicate with each other within an operating system (OS)…Oct 7Oct 7
Published inInfoSec Write-upsExploring Integer Overflow — The realm of exploiting binariesWhat Does Integer Overflow Mean?Oct 6Oct 6
Damn Vulnerable Windows Application in a NutshellDisclaimer: The code and techniques provided in this blog are intended for educational purposes only. They are designed to help individuals…Sep 20Sep 20
Exploring MSI Files: The Good, the Bad, and the UglyDisclaimer: The code and techniques provided in this blog are intended for educational purposes only. They are designed to help individuals…Sep 18Sep 18
Vulnerable Windows Driver In a NutshellDisclaimer: The code and techniques provided in this blog are intended for educational purposes only. They are designed to help individuals…Sep 15Sep 15
Anatomy of State of the Art DebuggerDebuggers are specialized tools used by developers, security researchers, and reverse engineers to inspect the internal behavior of…Sep 14Sep 14
All kill Zero Fill — Anatomy of EDR KillersThe evolution of Antivirus (AV) technologies began in the early 1980s with signature-based detection, where AVs identified malware by…Sep 12Sep 12
Vulnerable PDF reader in a NutshellDisclaimer: The code and techniques provided in this blog are intended for educational purposes only. They are designed to help individuals…Sep 10Sep 10