Advanced Search
Search Results
14 total results found
HideAndSec
We are a group of cybersecurity enthusiasts interested in various areas including software securi...
Members
mxrch Passionate about computing and security since always, I'm also interested in AI, blockchai...
Contact
Please contact us at : contact[at]hideandsec[d0t].sh If you have any question regarding our writ...
Introduction to Cobalt Strike
0x01 What is Cobalt Strike "Cobalt Strike is software for Adversary Simulations and Red Team O...
Cobalt Strike Process Injection
0x01 Intro Here are my thoughts on process injection and share some technical details about Coba...
NahamCon CTF 2020 Writeup
NahamCon CTF 2020 Writeup URL: https://ctf.nahamcon.com/challenges I got board on the weekend a...
Domain Control Elevation
0x01 Preface Just a collection of personal notes covering the following: Password in GPP and SY...
Defenses Evasion (The Quick'n Dirty)
This is just a quick and dirty overview of some defense evasion tactics that are out there for so...
The RC4 encryption
The RC4 encryption algorithm is a symmetric encryption algorithm. Symmetric encryption algorithm...
Windows thread control
Multithreading undoubtedly brings a lot of convenience and improves a lot of development efficien...
HackTM CTF 2020 Writeup
Since the CTF is still active I wont be dropping the flags. You can follow along and complete the...
Direct system call injection process to avoid anti-kill
The content is as titled. This is also a technology I have used for a long time. I have also pos...
NorthSec 2021 Badge Writeup
To learn more about the badge itself and the development behind the scenes I would recommend wa...
How to Hide Your CobaltStrike
CobaltStrike Overview Cobalt Strike is the most prevalent threat emulation software packages use...