Leveraging LLM Agents to Improve Report Writing and Bug Bounty Tasks |
Bug Bounty, IA, LLM |
@ferreiraklet |
Unhooking Linux Kernel Module Based EDRs |
Programming, Malware Development, Evasion |
@matheuzsec |
Making a 443MHz Jammer for Less Than $10 |
Hardware Hacking, Arduino |
@br0sck |
APT-38: Phishing Technique Using Visual Studio |
Phishing |
@matheuzsec |
#1 Malware Development: Detecting Sandboxes - Part 1 |
Programming, Malware Development |
@br0sck |
Unhooking Windows NTAPI to Bypass EDRs |
Programming, Malware Development, Evasion |
@br0sck |
Introduction to Loadable Kernel Module (LKM) |
Programming, Linux |
@matheuzsec |
Docker for Bug Bounty |
Bug Bounty |
@ferreiraklet |
Lateral Movement via RDP Hijacking |
Post-Exploitation, Windows, Privilege Escalation |
@br0sck |
Persistence with DLL Hijacking for Fun and Profit |
Post-Exploitation, Windows |
@ferreiraklet |
Writing an MBR Malware for Linux |
Programming, Malware Development, Linux |
@br0sck |
Persistence Combo for Linux |
Post-Exploitation, Linux |
@matheuzsec |