Categories
Tags
2FA ai Authentication ctf Data Recovery Discord dkom kernel-exploitation kernel-mode linux malware memory-management pentesting-diary-hack-with-me privilege-escalation process-internals Recovery red-team-tools redteam research reversing-engineering Security system-calls Token vuln-research windows Windows writeup
2025
5 posts
10-12
Windows Process & Thread Internals: EPROCESS, KTHREAD & Exploitation
09-28
Windows Memory Management Internals: Virtual Memory, Page Tables & Exploitation
09-15
Windows Architecture Deep Dive: User Mode vs Kernel Mode
07-28
Meterpreter Life Cycle
02-10
Repurposing remote desktop application as a strategic exploit