2025-11-21 Driver Reverse Engineering 101 - Part II: Unpacking a VMProtected Kernel Driver DriversKernelReverse EngineeringUnpackingVMProtect Reverse Engineering Windows Drivers Unpacking VMProtect is rather straightforward and there are many ways in which it is documented for userland processes -
2025-08-15 Driver Reverse Engineering 101 - Part I: Static Analysis DriversReverse EngineeringWindows Reverse Engineering Windows Drivers A few months ago, while hunting for vulnerable drivers to abuse for BYOVD on operations, I stumbled upon a repository of
2025-02-16 (Anti-)Anti-Rootkit Techniques - Part III: Hijacking Pointers Anti-RootkitData Pointer SwapKernelRootkitWindows Windows Kernel Rootkits In Part II of this series, we looked at how we could be hiding our rootkit’s thread from the eyes of a vigilant anti-roo
2024-09-19 (Anti-)Anti-Rootkit Techniques - Part II: Stomped Drivers and Hidden Threads Anti-RootkitKernelPspCidTableRootkitWindows Windows Kernel Rootkits At the end of Part I of this Series, we ended up with a small anti-rootkit driver, that was able to detect malicious dri
2024-03-23 (Anti-)Anti-Rootkit Techniques - Part I: UnKovering mapped rootkits Anti-RootkitKernelManual MappingRootkitWindows Windows Kernel Rootkits While some blog posts exist that talk about developing offensive drivers and rootkits, the only ones that I found, which
2024-03-11 Automating Deobfuscation of XorStringsNet .NETCILDeobfuscationReverse Engineering Reverse Engineering .NET Recently I wanted to learn a bit more about the .NET Common Intermediate Language (CIL). The CIL is basically the equiva
2024-02-25 Keylogging in the Windows kernel with undocumented data structures KernelKeyloggingRootkitWindowsgafAsyncKeyState Windows Kernel Rootkits If you are into rootkits and offensive windows kernel driver development, you have probably watched the talk Close Encou
2023-03-18 Abusing the GPU for Malware with OpenCL CUDAGPUMalwareOpenCL Malware Development I like esoteric programming topics, such as outsider languages or using obscure techniques to achieve some sort of goal.
2023-01-10 .NET Assembly Obfuscation for Memory Scanner Evasion .NETObfuscation Malware Development This is a blog I wrote for a former employer on how to evade memory scanners when using reflectively loaded .NET for pos
2022-11-25 Windows Access Tokens: Getting SYSTEM and demystifying Potato Exploits Access TokensWindows Malware Development If you are a penetration tester, you probably dealt with and abused windows access tokens before, e.g. to get SYSTEM pri