core-jmp.org/?p=229
core-jmp.org/?p=229
core-jmp.org/?p=225
core-jmp.org/?p=225
TL;DR
In this blog post, we’ll be covering Microsoft Warbird and how we can abuse it to sneakily load shellcode without being detected by AV or EDR solutions. #bypass #edt #microsoft #shellcode #Warbird #windows
core-jmp.org/?p=221
TL;DR
In this blog post, we’ll be covering Microsoft Warbird and how we can abuse it to sneakily load shellcode without being detected by AV or EDR solutions. #bypass #edt #microsoft #shellcode #Warbird #windows
core-jmp.org/?p=221
INTRODUCTION
Process Injection is a popular technique used by Red Teams and threat actors for defense evasion, privilege escalation, and other interesting use cases. #code #injection #noalloc #process #windows
core-jmp.org/?p=205
INTRODUCTION
Process Injection is a popular technique used by Red Teams and threat actors for defense evasion, privilege escalation, and other interesting use cases. #code #injection #noalloc #process #windows
core-jmp.org/?p=205
I. OVERVIEW
Endpoint Detection and Response (EDR) always provides strong protection for its executable file locations. #byovd #bypass #drivers #EDR #windows
core-jmp.org/?p=191
What the project is
av-edr-kill is a BYOVD (Bring Your Own Vulnerable Driver) proof-of-concept whose goal is to terminate security-product processes (AV/EDR), including Protected Process Light (PPL) #AV #EDR #kill #killer #poc
core-jmp.org/?p=188
wasm_plugins GitHub https://github.com/oxfemale/wasm_pluginsAbout the project wasm_plugins
- The packer creates a .mylib container that includes an encrypted WASM module, metadata (AAD), a GCM nonce, and a signature. #cpp #crypt #library #loader #plugins #wasm
core-jmp.org/?p=184
Hello again everyone! Hope the start to the new year is treating you well. I am excited to share a new blog post with you! #asm #cpp #debug #gadgets #ROP #shellcode #windows
core-jmp.org/?p=159
Hello again everyone! Hope the start to the new year is treating you well. I am excited to share a new blog post with you! #asm #cpp #debug #gadgets #ROP #shellcode #windows
core-jmp.org/?p=159
Hello everyone, today I’m sharing another red team technique—process injection—and how to leverage it against Protected Process Light (PPL). Let’s explore it in the blog post below. #dll #injection #PPL #ProcessInjection #redteam #windows
core-jmp.org/?p=136
Hello everyone, today I’m sharing another red team technique—process injection—and how to leverage it against Protected Process Light (PPL). Let’s explore it in the blog post below. #dll #injection #PPL #ProcessInjection #redteam #windows
core-jmp.org/?p=136
The post explores how Windows security products use kernel image load notifications to monitor when executables and DLLs are loaded by the system. #bypass #callbacks #image #kernel #library #load #windows
core-jmp.org/?p=122
The post explores how Windows security products use kernel image load notifications to monitor when executables and DLLs are loaded by the system. #bypass #callbacks #image #kernel #library #load #windows
core-jmp.org/?p=122
In this article, I will demonstrate one of the classic, fundamental techniques for injecting shellcode into a remote process using APCs. I realized I hadn’t documented this method yet, so that is exactly what we will cover today.
core-jmp.org/?p=113
In this article, I will demonstrate one of the classic, fundamental techniques for injecting shellcode into a remote process using APCs. I realized I hadn’t documented this method yet, so that is exactly what we will cover today.
core-jmp.org/?p=113
core-jmp.org/?p=89
core-jmp.org/?p=89