5 min read
Cybersecurity Research About one year ago we proposed the use of alternative coding styles to evade code scanners. Guess we gotta prove that it works.
About one year ago we proposed the use of alternative coding styles to evade code scanners. Guess we gotta prove that it works.
Using a few tricks we can make a PE payload, that looks like a PDF - including file name.
Exploiting suo and csproj files recently gained attention, used in attacks on Cybersecurity researchers. We found another way
At times, it will be handy to have all complementary evasion commands at hand. We tried to compile the ultimate list, without going overboard.
We made the bold claim, that all AMSI evasions still work. But is that really true? Come in for a ride.
We created a custom reverse shell from scratch and made it persistent - the result is scary, to say the least.