Erica ZelicJul 25, 20235 minPlaying with Bubbles: An Introduction to DLL-Sideloading DLL Side-Loading is a pervasive technique partially because its behavior is difficult to detect. As a sub-technique of DLL Hijacking, it ta
Nihaal PrasadOct 5, 20216 minReturn to Libc: Linux Exploit DevelopmentThis blog post will cover how to conduct a ret2libc attack. The ret2libc technique is a tactic used in Linux exploit development that allows
Mattia CampagnanoMay 20, 20206 minWeaponizing Windows Binaries and Scripts (LOLBAS): What's Old Is New AgainOne of the latest trends in penetration testing and malware development is to weaponize the so-called Living Off the Land Binaries and Scrip
Wade MaMar 3, 20209 minAutomated Obfuscation of Windows Malware and Exploits Using O-LLVMToday’s malware authors and exploit developers have automated methods of obfuscating their software, When these techniques are combined with