Published onSeptember 25, 2021A Beginner's Guide to Malware and EDR Evasioncybersecuritymalwareevasionwindowsoperating-systemsinternalsA beginner's guide to bypassing EDR systems using APC queue injection and direct system calls.
Published onJune 28, 2021Dumping Stored Enteprise Wi-Fi Credentials with Invoke-WifiSquidcybersecuritynetworkingwindowscryptographypasswordspost-exploitationCredential re-use is rampant, and every post-exploitation action that gets you credentials for potential lateral movement is a win in my book. Learn how to grab stored enterprise wifi credentials from compromised machines.
Published onJune 24, 2021Extracting Saved Browser Passwords: Your New Favorite Post-Exploitation Techniquecybersecuritypasswordspost-exploitationLearn how to extract saved browser passwords from compromised hosts for fun and profit - your new favorite post-exploitation technique!