Introduction I am a literal cyber wizard, well versed in the arts of the arcane C programming language and other low-level as well as high-level programming languages. I am adept at reverse engi...
Introduction
List of Process Injection Techniques
This list will serve as an introduction into many different kinds of process injection techniques. I will be adding links to articles that I have written about the techniques that I have learned ab...
Mitigating Program Tampering and Bypassing AV/EDR Through Blocking Operations on Executable Memory Pages (Part 2)
This article is a continuation in a multi-part evasion technique series to bypass antivirus (AV) and endpoint detection and response (EDR) systems. This method, unlike the last one discussed here, ...
Building a DLL Blocker to Bypass AV/EDR Hooking (Part 1)
This article will serve as an entry point into a multi-part evasion technique series to bypass antivirus (AV) and endpoint detection and response (EDR) systems. This method can also help protect le...
Getting Started With Git: A Comprehensive Guide for Beginners
Git is the most powerful and useful version control system that has revolutionized the way developers collaborate and manage code. In today’s article, we will cover the basics of Git and how to get...