+
In the previous post, we know how to use Registry Hijacking to bypass UAC on Windows 10. Today, we continue to do that with different technique with …
By Stephen Stinson
May 20, 2020
+
In the previous post, we know how to use Dll Hijacking to load our “desire code” into memory with WPF Applications on Windows 10. Today, we …
By Stephen Stinson
May 12, 2020
+
Hi everyone. In the time of Covid-19, we have nothing to do but research and self growth. After thinking for a while, we think finding software …
By Stephen Stinson
May 6, 2020
+
Have you ever wondered how malware is detected? How do malware scanners work? How does Gmail know that the suspicious attachment you got was “dangerous”? The …
By Andreas Griffin
March 12, 2020
+
In recent times, I have learned about techniques in developing modern malware. One of those techniques was to utilize PowerShell without executing the powershell.exe binary. After …
By Andreas Griffin
March 5, 2020
+
1. What is Living off the Land? The use of Living off the Land (LotL) tactics and tools by cyber criminals has been a growing trend …
By Andreas Griffin
February 27, 2020
+
Hi everyone, today I will introduce you to BlackArch OS and installation instructions. BlackArch is a penetration testing distribution based on Arch Linux that provides a …
By Andreas Griffin
February 21, 2020
+
Google reacted severely against nearly 600 Android apps in Play Store that were violating two ad-related policies by kicking them out of the repository. On Thursday …
By Cloudi
February 19, 2020