Got your new Schmalaxy SXT9000 Smartphone with the great features and security, but it's already boring? Let's bring tools like Metasploit or SQLMap into your Pocket
evasion
View All C2 True Cybercrime Pentesting Cybersecurity Cybersecurity Insights Evasion Enumeration Cybersecurity Research Operational Security Privilege Escalation Persistence Physical Access RedTeam Offensive Security Social Engineering
3 min read
Pentesting 2 min read
Evasion We already explored many simple pathes to be able to run exe files while bypassing EDR like Defender. Now we go a step further.
5 min read
Cybersecurity Research About one year ago we proposed the use of alternative coding styles to evade code scanners. Guess we gotta prove that it works.
5 min read
Cybersecurity Research Using a few tricks we can make a PE payload, that looks like a PDF - including file name.
2 min read
Cybersecurity Research Exploiting suo and csproj files recently gained attention, used in attacks on Cybersecurity researchers. We found another way
9 min read
Evasion At times, it will be handy to have all complementary evasion commands at hand. We tried to compile the ultimate list, without going overboard.