White PapersAmit PanghalMarch 05, 2024Bro, Do you even H/Invoke?The series explores techniques for gaining initial access in hardened environments, focusing on dynamic function resolution using H/Invoke within .NET.
White PapersNikhil SrivastavaJanuary 31, 2024Pwning the EDRs for Initial Access PART-2A detailed series on how to gain successful initial access inside a hardened environment part2.
White PapersNikhil SrivastavaJanuary 31, 2024Pwning the EDRs for Initial Access PART-1A detailed series on how to gain successful initial access inside a hardened environment.
White PapersNikhil SrivastavaNovember 11, 2023Demystifying Bring Your Own Reputation (BYOR) technique for fun and profitBYOR (Bring Your Own Reputation) is a reputation based technique exploiting bydesign flaws in the cyber defense.
White PapersNikhil SrivastavaDecember 28, 2022Defeating Antivirus Detection - अर्धजीवित/Zombie Bypass TechniqueIn a real-world scenario, this experiment is a step towards victory in the battle against AV technology with such zombie bypasses that used to live a few years ago.