Avred background: Advances in Reversing Defender Signature Format
New findings from Windows Defender signature database reverse engineering shed some light on the results of avred.
New findings from Windows Defender signature database reverse engineering shed some light on the results of avred.
EDR functionality and bypasses in 2024, with focus on undetected shellcode loader.
A shellcode loader laboratory for RedTeaming to experiment bypassing EDR.
Stealthy shellcode injection into executables to bypass EDR.
After only 8 years, i got myself a new computer.
Tools and technologies:
B&T call their suppressors simply something like “Rifle suppressor Rotex V”, which can be interpreted that the suppressor is called “Rotex V”, while in reality it is an attachment option - and the suppressor is called “Rifle suppressor”! Also there is a suppressor called MARS, which uses the attachment option MARS, which can also be used by other suppressors. But MARS suppressor can also be Direct-Mountable. Confused? Read this article.
Excerpts related to Ukraine from the book
The Clash of Civilizations and the Remaking of World Order
by Samuel P. Huntington, 1996.
Summary of the book “The 5 Love Languages” (Gary Chapman). No need for the book anymore. A very important topic for everyone to understand is that people have different love languages.
Other than COVID, there seems to be two other epidemics going on:
The AE 75 H radio scanner with 10 frequency ranges, 7 pre-programd search tapes, 300 memory slots and a frequency range of 25 - 512 MHz offers you everything an experienced user needs.
If you can figure out how to use that thing…
I did give an interview at the library of Zug about cryptocurrency.
A solution for the Fermi Paradox? Reality is irrelevant.
This is the mandatory initial post.