First and foremost, I like to keep the focus on learning and responsible research here. It's exciting to explore offensive security tradecraft, don't get me wrong. But I'd like to recognize the importance behind responsible use of the techniques and code I share on this blog. My goal is to enhance security not abuse it. The code I provide on this site is intended for educational purposes and meant to inform the cyber community. Lastly, I want to reiterate that the code on this site should be used responsibly, and I am in no way responsible for misuse. My code is sloppy, so it will be very obvious if I see it being used copy pasta out in the wild by the way 😸 Okay! With that little disclaimer out of the way, enjoy your stay and hit me up on discord if you want to learn more about a given topic, etc.
Quick links to popular content can be found below:
Well it’s already been a month since my last post, and that’s just way to long. Time gets ahead of me these days, especially being as interested in so many ...
Yo, how’s it going everyone. Sorry it’s been a while since my last post. Fear not, I’m geared up and ready to dive in to a full discussion on Malware evasi...
You have likely seen various forms of shellcode encoders in use via your favorite C2 toolkit. I’m oldschool and started my shellcode encoding experience usi...
You guys know what time it is? IT’S GO TIME! Time to dive in and learn how to detect a red teamer trying to grab your local SAM hashes from the registry.