A methodology for identifying significant Win32 APIs and achieving comprehensive visibility into all activities executed within WSL2.
- 
      posts
- 
          How to track WSL2 activity with API hooking
- 
          WEBASSEMBLY – EXECUTING MALICIOUS CODE USING SYSTEM()Adversaries are getting more innovative, less predictable and underscoring society’s need to stay one step ahead of them. In this post I am going to share a technique that came across my mind when I was learning about WebAssembly. 
- 
          WINDOWS SHELLCODE – DOWNLOAD AND EXECUTE PAYLOAD USING MSIEXECHello and welcome! Today I will be sharing a shellcode that came across my mind when I was preparing for my OSCE exam, so this inspired me to write and share my knowledge on how I developed a shellcode for windows to download and execute a remote payload using windows installer(msiexec.exe). 
- 
          CUSTOM_CRYPTER – LINUX/X86This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert Certification - Student ID: SLAE-1233
- Assignment: 7
- Github: Kartik Durg
 
- 
          POLYMORPHIC_SHELLCODE_EXAMPLE – LINUX/X86This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert Certification - Student ID: SLAE-1233
- Assignment: 6
- Github: Kartik Durg
 
- 
          DISSECTING_METASPLOIT_SHELLCODE – LINUX/X86This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert Certification - Student ID: SLAE-1233
- Assignment: 5
- Github: Kartik Durg
 
- 
          ROT13_XOR_ENCODER_MMX_DECODER_SHELLCODE – LINUX/X86This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert Certification - Student ID: SLAE-1233
- Assignment: 4
- Github: Kartik Durg
 
- 
          SHELLCODE_EGG_HUNTER – LINUX/X86This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert Certification - Student ID: SLAE-1233
- Assignment: 3
- Github: Kartik Durg
 
- 
          SHELL_REVERSE_TCP_IPV6 – LINUX/X86This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert Certification - Student ID: SLAE-1233
- Assignment: 2
- Github: Kartik Durg
 
- 
          SHELL_BIND_TCP_IPV6 – LINUX/X86This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert Certification - Student ID: SLAE-1233
- Assignment: 1
- Github: Kartik Durg
 
