Once made some architecture visualisations - maybe a chance to explain how these came to life and how I discovered: all evasions still work fine.
offensive security
View All C2 True Cybercrime Pentesting Cybersecurity Cybersecurity Insights Evasion Enumeration Cybersecurity Research Operational Security RedTeam Privilege Escalation Persistence Physical Access Offensive Security Social Engineering
2 min read
Evasion 7 min read
Cybersecurity Research As promissed, we continue executing code using rundll32 on a fully updated system.
2 min read
Cybersecurity Research Today we're looking at one of the most simple evasions - it's always fascinating to wittness the beauty of traditional hacking exploration methods working to their full extend. The rundll32.exe comma bypass is one of these examples.
2 min read
Pentesting Take a look at our Pentesting and CTF Flowcharts - they should help you especially in the beginning.
4 min read
Offensive Security Explore tactical approaches to bypass PowerShell execution policies, a critical competency for offensive security professionals. This article unveils 15 distinct tactics for executing PowerShell scripts unrestricted, equipping practitioners with the knowledge to navigate and manipulate execution policies effectively.