![Assembly.Load : Writing One Byte to Evade AMSI Scan](https://ddd.cyberwarfare.live/wp-content/uploads/2023/06/Blog-Feature.jpg)
Assembly.Load : Writing One Byte to Evade AMSI Scan
In this blog post, we will discuss a well-known method, which involves loading a .NET assembly (dll or exe) within C# code […]
![Bypassing AV/EDR Hooks via Vectored Syscall – POC](https://ddd.cyberwarfare.live/wp-content/uploads/2022/11/Untitled-design-69.png)
Bypassing AV/EDR Hooks via Vectored Syscall – POC
Bypassing AV/EDR Hooks via Vectored Syscall – POC Vectored Syscall It’s common to unhook any AV/EDRs hook in order to bypass them. […]
![Google WorkSpace Directory Dump Tool](https://ddd.cyberwarfare.live/wp-content/uploads/2022/07/Google-WorkSpace-Blog.jpg)
Google WorkSpace Directory Dump Tool
Google WorkSpace Directory Dump Tool Google Workspace Directory Extraction Tool : During a Cloud Red Team Project, as our last objective we […]
![Kernel Exploitation Series – 001 – Exploiting Asus Aura Sync (1.07.71) & Bypassing SMEP & KASLR](https://ddd.cyberwarfare.live/wp-content/uploads/2022/06/Kernel-Exploitation-Blog.jpg)
Kernel Exploitation Series – 001 – Exploiting Asus Aura Sync (1.07.71) & Bypassing SMEP & KASLR
Kernel Exploitation Series – 001 – Exploiting Asus Aura Sync (1.07.71) & Bypassing SMEP & KASLR CVE-2019-17603: Asus Aura Sync Introduction Asus […]
![Blending with McAfee [Part-3]](https://ddd.cyberwarfare.live/wp-content/uploads/2022/05/Blending-with-McAfee-Blog.jpg)
Blending with McAfee [Part-3]
Blending with McAfee [Part-3] Malwares are like parasites. They like to sit on other processes and perform malicious acts from there if […]
![EDR Series : Function Re-casting (Part-2)](https://ddd.cyberwarfare.live/wp-content/uploads/2022/03/EDR-2-Blog.jpg)
EDR Series : Function Re-casting (Part-2)
EDR Series : Function Re-casting (Part-2) In this series of blog post, we will explore about function re-casting while exploring McAfee EDR.
![EDR Series : How EDR Hooks API Calls (Part-1)](https://ddd.cyberwarfare.live/wp-content/uploads/2022/03/EDR-Blog.jpg)
EDR Series : How EDR Hooks API Calls (Part-1)
EDR Series : How EDR Hooks API Calls (Part-1) EDR is a hot topic in the present world. In this blog post One thing that we all know is most of the EDR hooks in the user-land.