About one year ago we proposed the use of alternative coding styles to evade code scanners. Guess we gotta prove that it works.
cybersecurity research
View All C2 True Cybercrime Pentesting Cybersecurity Cybersecurity Insights Evasion Enumeration Cybersecurity Research Operational Security Privilege Escalation Persistence Physical Access RedTeam Offensive Security Social Engineering
5 min read
Cybersecurity Research 5 min read
Cybersecurity Research Using a few tricks we can make a PE payload, that looks like a PDF - including file name.
2 min read
Cybersecurity Research Exploiting suo and csproj files recently gained attention, used in attacks on Cybersecurity researchers. We found another way
4 min read
Cybersecurity Research We created a custom reverse shell from scratch and made it persistent - the result is scary, to say the least.
7 min read
Cybersecurity Research As promissed, we continue executing code using rundll32 on a fully updated system.
2 min read
Cybersecurity Research Today we're looking at one of the most simple evasions - it's always fascinating to wittness the beauty of traditional hacking exploration methods working to their full extend. The rundll32.exe comma bypass is one of these examples.