karimmuya
  • Threat Hunting with Yara Rules

    Detecting Malware using YARA Rules

    May 19, 2022 - 6 minute read -
    blue teaming threat hunting
  • Abusing Kerberos unconstrained delegation and DCSync the Domain.

    This post demonstrates how to capture the domain controller’s Ticket-Granting-Ticket (TGT) by coerce a domain controller to authenticate to a computer configured with unconstrained delegation.

    May 8, 2022 - 5 minute read -
    red teaming active directory
  • GLIBC Heap Exploitation: The Tcache

    Exploring GLIBC Heap tcache exploitation techniques.

    April 10, 2022 - 8 minute read -
    ctf binary exploitation
  • Patching x86 Binaries using Radare 2

    Binary patching is the process of modifying a compiled executable to change its execution flow.

    April 5, 2022 - 3 minute read -
    ctf reverse engineering

__call_tls_dtors()
© 2022