Search results

  1. Prapattimynk

    Active Directory Kill Chain Attack & Defense

    Summary This document was designed to be a useful, informational asset for those looking to understand the specific tactics, techniques, and procedures (TTPs) attackers are leveraging to compromise active directory and guidance to mitigation, detection, and prevention. And understand Active...
  2. Prapattimynk

    Introduction to Malware Analysis and Reverse Engineering

    CS6038/CS5138 Malware Analysis Department of Electrical Engineering and Computing Systems College of Engineering and Applied Science University of Cincinnati Meets every Tue/Thu in 3210 RECCENTER @ 4:00PM-5:20PM Want to participate?: Apply to Graduate School Here This class will introduce the...
  3. Prapattimynk

    Game Exploit That Lets Hackers Take Over Your PC

    Intro Security vulnerabilities in online games aren't just theoretical - they happen more often than you'd think. Recently, I discovered a Remote Code Execution (RCE) exploit in Marvel Rivals that could allow an attacker on the same network to run arbitrary code on another player's device. The...
  4. Prapattimynk

    Awesome EDR Evasion

    EDR Evasion Techniques 🔹 Syscall Evasion Direct Syscalls: Calling syscalls directly to avoid API hooks. Indirect Syscalls: Using techniques like "Hell's Gate" or "Halo's Gate" to resolve and execute syscalls dynamically. Recycled Gate: Reusing a legitimate syscall from a different process...
Back
Top