Recent post
24 Jan 2023

Attack, Detection, and Reversal of a Stageless Havoc Implant

This post explores the offensive and defensive aspects of stageless Havoc implants, covering how they are deployed, detected, and mitigated in modern cybersecurity environments.

25 Jan 2023

Autonomous Lateral Movement in Red Team Operations

Autonomous lateral movement allows Red Teams to navigate networks, simulate attacks, and uncover hidden vulnerabilities efficiently, helping defenders strengthen detection and response strategies.

25 Jan 2023

Defeating Windows DEP Using ROP Chains Leveraging VirtualAlloc

A Practical Walkthrough of Bypassing Windows Data Execution Prevention with Return‑Oriented Programming Leveraging VirtualAlloc

27 Feb 2026

The Way of The Adversary

The adversary philosophy and mindset are important when trying to emulate a threat actor during a red team operation or offensive cybersecurity assessment or trying to understand them as a defender