Forrest OrrDec 1, 202037 min readA Modern Exploration of Windows Memory Corruption Exploits - Part I: Stack OverflowsIntroduction The topic of memory corruption exploits can be a difficult one to initially break in to. When I first began to explore this...
Forrest OrrAug 4, 202023 min readMasking Malicious Memory Artifacts – Part III: Bypassing Defensive ScannersIntroduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and...
Forrest OrrJul 16, 202019 min readMasking Malicious Memory Artifacts – Part II: Blending in with False PositivesIntroduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and...