W4LK3R
GitHubLinkedInEmail
  • Home
    • Who am I ?
  • Research
    • Double Take Zero Day (CVE-2023–40459)
  • Red Team Diaries
    • #1 Domain Admin in 2 Hours
    • #2 Low Hanging Credentials
  • Malware Development
    • Basics
    • Dynamic Link Library
    • Code Execution
      • Create Local Thread
      • DLL Execution ( Disk )
      • Function Pointer (No API)
      • Handle2Self
      • Thread2Fiber
      • Callback Functions
      • Local Thread Hijacking / Context Injection
      • Local Mapping Injection
      • Local Module Stomping / DLL Hollowing
      • Local Function Stomping
Powered by GitBook

Last updated 14 days ago

Was this helpful?

Who am I ?

I'm w4lk3r, an offensive security engineer and red team consultant by day, malware researcher and reverse engineer by night.

I mostly focus on low-level Windows stuff, endpoint defense evasion, pwning Active Directory, post-exploitation techniques, system programming, blasting (almost) all favors of metal and rock music 24/7 and also have a huge caffeine intake in order to stay alive.


What is this ?

This blog will serve as a place for sharing my experience in what i do and how i do it. don't expect it to be a complete tutorial on anything, but I'll do my best to keep it as authentic and comprehensive as possible. The topics will vary from real-world red teaming stories, offensive research, malware development and (maybe) binary exploitation.

If you are interested in different offensive/defensive security tradecraft, you can check out:


Where to Find Me ?

LinkedIn
Email
GitHub
Home | The Hive
Logo
Page cover image