| Writing a Ring 3 Rootkit for Windows |
Malware Development, Windows, Rootkit, Programming |
@br0sck |
| Exploiting the Java Heap Dump Flaw in Spring Boot Applications |
Web Exploitation, Bug Bounty |
@moluck |
| Leveraging LLM Agents to Improve Report Writing and Bug Bounty Tasks |
Bug Bounty, IA, LLM |
@ferreiraklet |
| Unhooking Linux Kernel Module Based EDRs |
Programming, Malware Development, Evasion |
@matheuzsec |
| Making a 443MHz Jammer for Less Than $10 |
Hardware Hacking, Arduino |
@br0sck |
| APT-38: Phishing Technique Using Visual Studio |
Phishing |
@matheuzsec |
| #1 Malware Development: Detecting Sandboxes - Part 1 |
Programming, Malware Development |
@br0sck |
| Unhooking Windows NTAPI to Bypass EDRs |
Programming, Malware Development, Evasion |
@br0sck |
| Introduction to Loadable Kernel Module (LKM) |
Programming, Linux |
@matheuzsec |
| Docker for Bug Bounty |
Bug Bounty |
@ferreiraklet |
| Lateral Movement via RDP Hijacking |
Post-Exploitation, Windows, Privilege Escalation |
@br0sck |
| Persistence with DLL Hijacking for Fun and Profit |
Post-Exploitation, Windows |
@ferreiraklet |
| Writing an MBR Malware for Linux |
Programming, Malware Development, Linux |
@br0sck |
| Persistence Combo for Linux |
Post-Exploitation, Linux |
@matheuzsec |