I’m watching you! How to spy Windows users via MS UIADive into the world of development with COM, explore the Windows graphical tree, and create a real SpyWare with our new researchJan 5Jan 5
Hijack the TypeLib. New COM persistence techniqueA new way of persistence on Windows systems via COM. Down with COM Hijacking, the future is TypeLib Hijacking! Read more here :)Oct 22, 2024Oct 22, 2024
Evil MSI. A long story about vulnerabilities in MSI FilesMSI Files are used ubiquitously in Windows. What vulnerabilities might they contain?Aug 30, 20241Aug 30, 20241
OSEP Unleashed. The advance of in-memory payload executionEverything OSEP didn’t tell you. How to execute payloads in memory and bypass antivirus.Jul 27, 2024Jul 27, 2024
Process Injection is Dead. Long Live IHxHelpPaneServerProcess Injection without Process Injection. Exploring cross-session activation mechanisms to steal someone else’s session using COMJul 15, 2024Jul 15, 2024
From HTTP to RCE. How to leave backdoor in IISI will show the way of persistence on a target system using legitimate Microsoft product being Internet Information Services.Jul 3, 2024Jul 3, 2024