Amolo ☽

Papers

Title About Author
Leveraging LLM Agents to Improve Report Writing and Bug Bounty Tasks Bug Bounty, IA, LLM @ferreiraklet
Unhooking Linux Kernel Module Based EDRs Programming, Malware Development, Evasion @matheuzsec
Making a 443MHz Jammer for Less Than $10 Hardware Hacking, Arduino @br0sck
APT-38: Phishing Technique Using Visual Studio Phishing @matheuzsec
#1 Malware Development: Detecting Sandboxes - Part 1 Programming, Malware Development @br0sck
Unhooking Windows NTAPI to Bypass EDRs Programming, Malware Development, Evasion @br0sck
Introduction to Loadable Kernel Module (LKM) Programming, Linux @matheuzsec
Docker for Bug Bounty Bug Bounty @ferreiraklet
Lateral Movement via RDP Hijacking Post-Exploitation, Windows, Privilege Escalation @br0sck
Persistence with DLL Hijacking for Fun and Profit Post-Exploitation, Windows @ferreiraklet
Writing an MBR Malware for Linux Programming, Malware Development, Linux @br0sck
Persistence Combo for Linux Post-Exploitation, Linux @matheuzsec