Search this site
Embedded Files
Skip to main content
Skip to navigation
Deez
Home
Resources
Deez
Resources
Pentesting Cheatsheets
Convenient commands for your pentesting / red-teaming engagements, OSCP and CTFs.
Upgrade your DLL to Reflective DLL
If you want to execute code stealthily on a machine and the antivirus stands in your way, you should think about avoiding the disk because this is the place where the antivirus reigns. In this scen…
Ten process injection techniques: A technical survey of common and trending process injection techniques
Process injection is a widespread defense evasion technique employed often within malware and fileless adversary tradecraft, and entails running custom code within the address space of another process. Process injection improves stealth, and some techniques also achieve persistence. Although there are numerous process injection techniques, in this blog I present ten techniques seen in the wild that run malware code on behalf of another process.
Live off the Land and Crack the NTLMSSP Protocol
Live Off the Land in Windows and intercept NTLMv2 hashes! A new tool NTLMRawUnHide is introduced to extract NTLMv2 hashes from raw packet traces, and we learn more about the NTLMSSP protocol.
Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse