Categories
Tags
2FA ai Authentication ctf Data Recovery Discord dkom kernel-exploitation kernel-mode linux malware memory-management pentesting-diary-hack-with-me privilege-escalation process-internals Recovery red-team-tools redteam research reversing-engineering Security system-calls Token vuln-research windows Windows writeup
2025
6 posts
10-12
Windows Process & Thread Internals: EPROCESS, KTHREAD & Exploitation
09-28
Windows Memory Management Internals: Virtual Memory, Page Tables & Exploitation
09-15
Windows Architecture Deep Dive: User Mode vs Kernel Mode
07-28
Meterpreter Life Cycle
04-22
Slice the Stack, Spot the Bug: From Registers to Root Cause
02-10
Repurposing remote desktop application as a strategic exploit
2023
2 posts
08-11
Windows Internals: The Art of Self-Deletion
07-09
Windows Internals: A Look at Callback Functions
2022
8 posts
12-08
Binary Classification and Linear Regression: A Comprehensive Analysis
06-12
Pentesting Diary - Hack with Me: [4] NullByte
05-29
Pentesting Diary - Hack with Me: [3] Dev Guru
02-06
Pentesting Diary - Hack with Me: [2] Photographer
02-04
Pentesting Diary - Hack with Me: [1] Hack kid 1.0.1
02-02
Dropper with C++
01-22
Remote PE Loading
01-22
The Dark Arts of PE Loading in Windows