Archives
- 20 Nov Course Review - HackTheBox Bug Bounty Hunter
- 05 Oct Malware Development 17 - Introduction to offensive Nim
- 01 Oct Malware Development 16 - Process Hollowing (Golang)
- 13 Oct Malware Development 15 - Using Hooka and Maldev for Malware Dev (Golang)
- 16 Sep Malware Development 14 - UAC bypass privilege escalation (Golang)
- 15 Sep Malware Development 13 - Shellcode injection without VirtualAllocEx RWX (Golang)
- 24 Jul Malware Development 12 - Patching Event Tracing for Windows (Golang)
- 23 Jul Malware Development 11 - Privesc via named pipes as Metasploit getsystem (Golang)
- 15 Jun Malware Analysis 2 - All about Yara rules
- 30 Apr Malware Development 10 - Persistence via DLL Hijacking (Golang)
- 27 Apr Malware Development 9 - Protecting processes as blockdlls (Golang)
- 13 Apr Malware Development 8 - Shellcode Injection via EnumDesktopsW (Golang)
- 11 Apr Malware Analysis 1 - Creating a PE parser, Shannon Entropy and more (Golang)
- 31 Mar Malware Development 7 - Persistence via autorun registry (Golang)
- 29 Mar Malware Development 6 - Analysis evasion via anti-sandboxing tricks (Golang)
- 27 Mar Malware Development 5 - Malware analysis evasion via Api Hashing (Golang)
- 24 Mar Malware Development 4 - Dump lsass.exe process + AV/EDR evasion (Golang)
- 13 Mar Malware Development 3 - Persistence via Recycle Bin (Golang)
- 12 Mar Malware Development 2 - UuidFromString shellcode injection (Golang)
- 11 Mar Malware Development 1 - CreateRemoteThread shellcode injection (Golang)
- 09 Mar Malware Development 0 - How to call Windows API from Go
- 14 Oct AV Bypassing - Powershell Obfuscation
- 18 Sep Curso de Hacking Wifi