SEKTOR7 Institute
@sektor7net
Homo Aptus.
Vincit qui se vincit - Publilius Syrus.
Consulting, Training, Technology, Cyber domain, and more...
@x33fcon supporter.
ID: 1120035459739136001
https://institute.sektor7.net 21-04-2019 18:43:57
1,1K Tweet
12,12K Followers
338 Following
Gluing Windows "features" to get into PPL process without BYOVD, by Nathan Blondel #redteam #maldev blog.slowerzs.net/posts/pplsyste…
To Sysmon or not to Sysmon... by Alex Teixeira #redteam #maldev detect.fyi/sysmon-a-viabl…
Bypassing HVCI within the root partition, by Satoshi Tanda #redteam #maldev tandasat.github.io/blog/2024/01/1…
🎉 A HUGE thank you to our amazing prize sponsors! 🎉 Your generous contributions help make the RTV experience unforgettable. We're incredibly grateful for your support. 🙌 BC Security Millennium Corporation No Starch Press SANS Institute PentesterLab The SecOps Group RTFM
Injection detection with network artifacts, by Ofir Shen of Akamai Technologies. #redteam #maldev akamai.com/blog/security-…
Defender's decoys are in da'house!, by Dylan 🎃AttacktheSOC #redteam #maldev attackthesoc.com/posts/stacking…
A journey to building a custom EDR, by Aurélien Chalot #redteam #maldev blog.whiteflag.io/blog/from-wind…
A story of Asynchronous Procedure Calls in Windows, by the one and only, Pavel Yosifovich (Pavel Yosifovich) #redteam #maldev scorpiosoftware.net/2024/07/24/wha…
Thread Name-Calling - a new recipe for code injection, by hasherezade #redteam #maldev research.checkpoint.com/2024/thread-na…