Tunneling C2 messages in ICMP traffic.
Heap Exploitation: The House of Force
Tampering with the top chunk size field for an arbitrary write primitive.
Certificate Based Persistence
Using AD CS certificates to achieve persistence in an Active Directory environment.
Offensive Security Experienced Penetration Tester (OSEP) Review
A review of the Evasion Techniques and Breaching Defences course by Offensive Security.