Posts
All the articles I've posted.
-
Malware Persistence in Window Operating System 101
Plays an important role in Initial Access and Execution stages because it assists malicious programs in remaining active for a long time, thus leading to create a backdoor for threat actor without detection.
-
Crackmes : Hekliet's keygenme
Reverse engineering a custom easy keygen to find a valid licence key using static and script
-
Bypass UAC Technique 101 on Window Operating
UAC bypass methods usually result in hijacking the normal execution flow of an elevated application by spawning a malicious child process or loading a malicious module inheriting the elevated integrity level of the targeted application.
-
Malware Injection in Window Operating System 101
In the modern cybersecurity, the most dangerous threats are the ones you can not see. Instead of running as easily detectable standalone files, several malwares are able to hide in plain sight by injecting malicious code directly into trusted and legitimate Windows processes. This is a reason why OS get hard to detect them.