Recently Created Pages View All
How to Hide Your CobaltStrike
CobaltStrike Overview Cobalt Strike is the most prevalent threat emulation software packages use...
NorthSec 2021 Badge Writeup
To learn more about the badge itself and the development behind the scenes I would recommend wa...
Direct system call injection process to avoid anti-kill
The content is as titled. This is also a technology I have used for a long time. I have also pos...
HackTM CTF 2020 Writeup
Since the CTF is still active I wont be dropping the flags. You can follow along and complete the...
Windows thread control
Multithreading undoubtedly brings a lot of convenience and improves a lot of development efficien...
Recently Created Chapters View All
Recently Created Books View All
Who are we and who sits behind the mask?
Red Teaming Tactics
Red teaming methodologies, tools, and techniques
Bug Bounty | Vulnerabilities Indepth
In depth view of how to attack and defend against modern day attack vectors
Bug Bounty | Bughunting Oneliners
Useful commands and code specifically tailored to improving your bug-bounty-hunting-skills