Weaponizing Windows APIs: A Deep Dive into Process Injection
Learn how malware injects code into running processes by leveraging Windows APIs like OpenProcess, VirtualAllocEx, and CreateRemoteThread
1309 words
|
7 minutes
Cover Image of the Post
Behind the Shell: Investigating a Stealthy AppleScript macOS Implant
A deep dive into a fileless macOS malware campaign leveraging AppleScript, osascript, and curl to execute modular payloads without touching disk.
2399 words
|
12 minutes
Cover Image of the Post
Malicious Mechanics of ELF: Shellcode, Segments & Stealth
A deep dive into how attackers exploit ELF internals to inject, persist, and execute malicious payloads on Linux systems
1493 words
|
7 minutes
Cover Image of the Post
Obfuscated JS in CDATA
A deep dive into how attackers abuse SVG images with embedded JavaScript to execute AiTM phishing and bypass MFA using stealthy obfuscation and dynamic payloads.
966 words
|
5 minutes
Cover Image of the Post
Stealing Control with LD_PRELOAD
Explore how LD_PRELOAD can hijack Linux binaries at runtime—powerful for both reverse engineering and real-world exploitation
966 words
|
5 minutes
Cover Image of the Post
The Elliptic Curve Backdoor: A Hidden Flaw in Randomness
A deep dive into how randomness and elliptic curves intertwine—and how one subtle backdoor almost compromised it all
714 words
|
4 minutes
Cover Image of the Post