Published onSeptember 25, 2021A Beginner's Guide to Malware and EDR Evasioncybersecuritymalwareevasionwindowsoperating-systemsinternalsA beginner's guide to bypassing EDR systems using APC queue injection and direct system calls.
Published onJune 28, 2021Dumping Stored Enteprise Wi-Fi Credentials with Invoke-WifiSquidcybersecuritynetworkingwindowscryptographypasswordspost-exploitationCredential re-use is rampant, and every post-exploitation action that gets you credentials for potential lateral movement is a win in my book. Learn how to grab stored enterprise wifi credentials from compromised machines.