4xpl0r3r
ArchivesCategoriesTagsAbout
  • Tags
  • Antivirus Evasion
Posted 2023-03-13Updated 2023-03-13Red&Blue16 minutes read (About 2354 words)

C2 Payload Hiding and Memory Forensics

There is a common method to execute a malicious payload in a download cradle to bypass the antivirus’ detection. Here I’m going to show you how to use volatility to perform memory forensics and extract malicious payloads from memory.

Read more
4xpl0r3r

4xpl0r3r

OSCE3 | OSCP | CTFer

Orange Cyberdefense, Shanghai

Posts

7

Categories

5

Tags

21

follow.it

Links

  • Switch Language - 简体中文cn.4xpl0r3r.com
  • GitHubgithub.com
  • HackerOnehackerone.com

Categories

  • Certifications1
  • Docs1
  • Experience2
  • Red&Blue1
  • Vuln-Analysis2

Recents

2024-02-29

Deal with the network issue of UDP services with Clash TUN mode enabled

Experience

2023-03-13

C2 Payload Hiding and Memory Forensics

Red&Blue

2023-02-14

Using CodeQL to find out Log4j CVE-2021-44228

Experience

2022-01-30

Vulnerability-Analysis - CVE-2021-4034 Linux Polkit Privilege Escalation

Vuln-Analysis

2022-01-27

OSCE3 Review (OSCP+OSEP+OSWE+OSED)

Certifications

Archives

  • February 20241
  • March 20231
  • February 20231
  • January 20223
  • August 20211

Tags

Antivirus Evasion1
Blue Teaming1
C#1
C&C++1
C21
CTF1
CVE3
CodeQL1
Environment1
Format String1
JNDI2
Java2
Linux1
Memory Forensics1
Network1
OffSec1
PWN1
PowerShell1
Priv-Escalation1
Red Teaming1
Troubleshooting1
4xpl0r3r

© 2024 4xpl0r3r  Powered by Hexo & Icarus

×