❌

Reading view

There are new articles available, click to refresh the page.

Excelling at Excel, Part 4

By: adam
Excel is the emperor of automation. Not the SOAR type, but the local one – yours. Why? Its formulas and VBA capabilities can turn many awfully mundane tasks into plenty of automation opportunities… For instance… certain programming tasks. The case/switch … Continue reading β†’

The art of cutting corners

By: adam
I love ROI-driven solutions and this post is about one of them. My personal cybersecurity consulting practice exposed me to many different types of β€˜IT security’ jobs over last 13 years and today I will describe one of them… Nearly … Continue reading β†’

Subfrida v0.1

By: adam
As many of you know, I am a big fan of Frida framework and I love its intuitiveness and flexibility, especially when it comes to auto-generating handlers for hooked functions, even if they are randomly chosen. In my older Frida … Continue reading β†’

From Underground to Overground

By: adam
There are many debates and infosec dramas related to vulnerability research, publishing Offensive Security Tools (OST), Proof Of Concept (POC) Code, and in recent days – some Original Gangsters (OG) are reflecting on their own doings by posting teary memoirs … Continue reading β†’

Lolbin Wow Ltd x 2

By: adam
I have already covered cases where I abused WINDIR environment variable to LOLBINize some WoW executables. I thought I covered w32tm.exe before, but looking at my blog history I can’t find any reference to it. So, here it is:

2 little secrets of ScriptRunner.exe

By: adam
ScriptRunner.exe is a known lolbin, but the Lolbas project doesn’t cover all of this program’s features. Timeout It can execute child processes and kill them after a certain timeout f.ex.: ScriptRunner.exe -appvscript cmd.exe -appvscriptrunnerparameters -timeout=5 Multiple invocations It can execute … Continue reading β†’

1 little known secret of fondue.exe

By: adam
Same as in the previous case, we can copy the main executable fondue.exe to a different folder f.ex. c:\test and start it from there, loading the c:\test\appwiz.cpl we control in the process.

Bitmap Hunting in SPL

By: adam
One of the most annoying hunting exercises is detecting a sequence of failures followed by a success. Brute-force attacks, dictionary attacks, and finally password spray attacks have all this in common: lots of failures, sometimes followed by a success. The … Continue reading β†’
❌