-
Threat Hunting with Yara Rules
Detecting Malware using YARA Rules
-
Abusing Kerberos unconstrained delegation and DCSync the Domain.
This post demonstrates how to capture the domain controller’s Ticket-Granting-Ticket (TGT) by coerce a domain controller to authenticate to a computer configured with unconstrained delegation.
-
GLIBC Heap Exploitation: The Tcache
Exploring GLIBC Heap tcache exploitation techniques.
-
Patching x86 Binaries using Radare 2
Binary patching is the process of modifying a compiled executable to change its execution flow.