A methodology for identifying significant Win32 APIs and achieving comprehensive visibility into all activities executed within WSL2.
-
posts
-
How to track WSL2 activity with API hooking
-
WEBASSEMBLY – EXECUTING MALICIOUS CODE USING SYSTEM()
Adversaries are getting more innovative, less predictable and underscoring society’s need to stay one step ahead of them. In this post I am going to share a technique that came across my mind when I was learning about WebAssembly.
-
WINDOWS SHELLCODE – DOWNLOAD AND EXECUTE PAYLOAD USING MSIEXEC
Hello and welcome! Today I will be sharing a shellcode that came across my mind when I was preparing for my OSCE exam, so this inspired me to write and share my knowledge on how I developed a shellcode for windows to download and execute a remote payload using windows installer(msiexec.exe).
-
CUSTOM_CRYPTER – LINUX/X86
This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert Certification
- Student ID: SLAE-1233
- Assignment: 7
- Github: Kartik Durg
-
POLYMORPHIC_SHELLCODE_EXAMPLE – LINUX/X86
This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert Certification
- Student ID: SLAE-1233
- Assignment: 6
- Github: Kartik Durg
-
DISSECTING_METASPLOIT_SHELLCODE – LINUX/X86
This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert Certification
- Student ID: SLAE-1233
- Assignment: 5
- Github: Kartik Durg
-
ROT13_XOR_ENCODER_MMX_DECODER_SHELLCODE – LINUX/X86
This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert Certification
- Student ID: SLAE-1233
- Assignment: 4
- Github: Kartik Durg
-
SHELLCODE_EGG_HUNTER – LINUX/X86
This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert Certification
- Student ID: SLAE-1233
- Assignment: 3
- Github: Kartik Durg
-
SHELL_REVERSE_TCP_IPV6 – LINUX/X86
This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert Certification
- Student ID: SLAE-1233
- Assignment: 2
- Github: Kartik Durg
-
SHELL_BIND_TCP_IPV6 – LINUX/X86
This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert Certification
- Student ID: SLAE-1233
- Assignment: 1
- Github: Kartik Durg