
A Modern Exploration of Windows Memory Corruption Exploits – Part I: Stack Overflows
Introduction The topic of memory corruption exploits can be a difficult one to initially break in to. When I first began to explore this topic on the Windows OS I was immediately struck by the ... Read More

Masking Malicious Memory Artifacts – Part III: Bypassing Defensive Scanners
Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and detection is becoming an increasingly valuable skill to add to both an attacker and ... Read More

Masking Malicious Memory Artifacts – Part II: Insights from Moneta
Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and detection is becoming an increasingly valuable skill to add to both an attacker and ... Read More

Masking Malicious Memory Artifacts – Part I: Phantom DLL Hollowing
Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and detection is becoming an increasingly valuable skill to add to both an attacker and ... Read More