Posts by Category
Research
Utilizing BTunnel For Data Exfiltration
Utilizing BTunnel to create tunnels without detections in order to exfiltrate data and to have persistence across the...
Compromising Open Source Password Safes
You might come accross Keepass or PWSafe during your assessment, have you ever tried cracking them?
Abusing GitHub File Upload Feature via GitHub Comments
GitHub has a functionality of uploading files when you create comments in repositories which can be abused by the thr...
Abusing Cloudflared - A Proxy Service To Host/Share Applications
Cloudflared can be used to host phishing sites, hide your maliciouness behind cloudflare owned subdomain and bypass s...
Palo Alto Exploit Analysis of CVE-2024-3400
Initial analysis of Palo Alto command injection vulnerability in GlobalProtect under CVE 2024-4300
Malware Analysis
AOML - Askbot1 Malware Analysis
In this article, we will be dissecting and finding more information about Asbot1 using some very basic tools.
AOML - Setting Up FlareVM & REMNUX
In this article, we will be setting up FlareVM and REMNUX to follow along the course 'The Art of Malware Analysis'
Emotet Word Document Analysis
Conducting malware analysis on Emotet Word Document.
Community
Malware Analysis Resources
A list of my community resources for learning Malware Analysis.
Community Contributions
A list of my community articles, profiles as well as open source contributions for easy access.