2023-09-02 |
Stealth Alternate Data Streams and Other ADS Weirdness |
Alternate Data Streams ‧ Matt |
|
2023-09-02 |
Dropping Executables with Powershell |
powershell ‧ Matt |
|
2023-09-02 |
Targeted Heap Spraying – 0x0c0c0c0c is a Thing of the Past |
Matt |
|
2023-09-02 |
Integrating WinDbg and IDA for Improved Code Flow Analysis |
Matt |
|
2023-09-02 |
Cool kids pop a programmer's calc in their demos |
shellcode ‧ Matt |
|
2023-09-02 |
Post-mortem Analysis of a Use-After-Free Vulnerability (CVE-2011-1260) |
use-after-free ‧ Matt |
|
2023-09-02 |
Leveraging format string vulnerabilities to interrogate Win32 process memory |
ASLR ‧ Matt |
|
2023-09-02 |
Welcome! |
Matt |
|
2021-02-28 |
Device Guard and Application Whitelisting on Windows - An Airing of Grievances |
application whitelisting ‧ Matt Graeber |
|
2021-02-28 |
Exploiting PowerShell Code Injection Vulnerabilities to Bypass Constrained Language Mode |
constrained language mode ‧ Matt Graeber |
|
2021-02-28 |
Application of Authenticode Signatures to Unsigned Code |
Authenticode ‧ Matt Graeber |
|
2021-02-28 |
Bypassing Device Guard with .NET Assembly Compilation Methods |
.NET ‧ Matt Graeber |
|
2021-02-28 |
PowerShell is Not Special - An Offensive PowerShell Retrospective |
powershell ‧ Matt Graeber |
|
2021-02-28 |
Updating Device Guard Code Integrity Policies |
application whitelisting ‧ Matt Graeber |
|
2021-02-28 |
Code Integrity on Nano Server: Tips/Gotchas |
Code Integrity ‧ Matt Graeber |
|
2021-02-28 |
On the Effectiveness of Device Guard User Mode Code Integrity |
application whitelisting ‧ Matt Graeber |
|
2021-02-28 |
Device Guard Code Integrity Policy Auditing Methodology |
Device Guard ‧ Matt Graeber |
|
2021-02-28 |
Windows Device Guard Code Integrity Policy Reference |
Device Guard ‧ Matt Graeber |
|
2021-02-28 |
Using Device Guard to Mitigate Against Device Guard Bypasses |
Device Guard ‧ Matt Graeber |
|
2021-02-28 |
Introduction to Windows Device Guard: Introduction and Configuration Strategy |
application whitelisting ‧ Matt Graeber |
|
2021-02-28 |
Bypassing Application Whitelisting by using WinDbg/CDB as a Shellcode Runner |
Matt Graeber |
|
2021-02-28 |
WMI Persistence using wmic.exe |
Matt Graeber |
|
2021-02-28 |
Misconfigured Service ACL Elevation of Privilege Vulnerability in Win10 IoT Core Build 14393 |
powershell ‧ Matt Graeber |
|
2021-02-28 |
Properly Retrieving Win32 API Error Codes in PowerShell |
Matt Graeber |
|
2021-02-28 |
The PowerSploit Manifesto |
powershell ‧ Matt Graeber |
|
2021-02-28 |
Offensive Tool Design and the Weaponization Dilemma |
powershell ‧ Matt Graeber |
|
2021-02-28 |
WMI object correlation using ASSOCIATORS OF |
powershell ‧ Matt Graeber |
|
2021-02-28 |
Thoughts on Exploiting a Remote WMI Query Vulnerability |
Dell Foundation Services ‧ Matt Graeber |
|
2021-02-28 |
Investigating Subversive PowerShell Profiles |
incident response ‧ Matt Graeber |
|
2021-02-28 |
Encrypting and Viewing DNS Connections Using DNSCrypt for Windows |
DNS ‧ Matt Graeber |
|
2021-02-28 |
.NET Method Internals - Common Intermediate Language (CIL) Basics |
.NET ‧ Matt Graeber |
|
2021-02-28 |
PowerShell Summit 2014 |
powershell ‧ Matt Graeber |
|
2021-02-28 |
Analyzing the "Power Worm" PowerShell-based Malware |
malware analysis ‧ Matt Graeber |
|