Today we're looking at one of the most simple evasions - it's always fascinating to wittness the beauty of traditional hacking exploration methods working to their full extend. The rundll32.exe comma bypass is one of these examples.
offensive security
Take a look at our Pentesting and CTF Flowcharts - they should help you especially in the beginning.
Explore tactical approaches to bypass PowerShell execution policies, a critical competency for offensive security professionals. This article unveils 15 distinct tactics for executing PowerShell scripts unrestricted, equipping practitioners with the knowledge to navigate and manipulate execution policies effectively.
Discover a simple persistence technique to leverage environment path interception vulnerabilities, using SCRNSAVE.exe to trigger a Sliver mTLS payload. This detailed guide covers the process from identifying the vector to executing the Sliver payload, aimed at offensive security professionals seeking to enhance their toolkit.