Obfuscation using Export Table
Hey Folks! Today I am going to share how you can use the export table to obfuscate Winapi calls to bypass Antivirus's static and dynamic (upto certain extent) detection. So…
Hey Folks! Today I am going to share how you can use the export table to obfuscate Winapi calls to bypass Antivirus's static and dynamic (upto certain extent) detection. So…
Hello everyone! Today, I will discuss a tool called Modlishka, a reverse proxy that proves useful in phishing during red team engagements. I won't delve into the setup details for…
Hey Guyz! I am writing this blog with respect to my recent project TokenStealer, which can help to steal the access token of a user when an attacker has local…
Hey folks! Today I am going to explain the working of cobalt strike executes assembly, and how it executes managed code through unmanaged Windows API. So, let's begin! What…
Hey Guys, hope you all are doing well! After so long, I decided to write blogs about Active Directory attacks and their detections through Windows Events. This is my first…
Hey Guys! In the previous blog, we touched on the basics of blockchain, transactions, etc. In this blog, we are going to see the basics of Ethereum and will move…
Hey Guyz! I am starting a series on Blockchain, where I will be writing about blockchain, Ethereum, solidity, smart contract audit, and their security implications, etc. In this part, I…
Hello folks! This blog will help you to walk through the fakeApp vulnerable application. You can download the apk from here. Let's begin now. Installation You can download the apk…
Hello Folks, Today we will learn about Deep Links in Android, and how to exploit them. So let's begin. What is Deep Link Deep links are basically a URL when…
Hello Folks! I am back with another blog where I have reversed one of the real-world applications, in which I have successfully managed to add the money to the application's…