Interesting links from the intertubes
redteam-pentesting.de excellent article on reflection
- Windows Coercion Methods
- Reflective Kerberos Relay Attack
- Reflective Kerberos Relay Attack (PDF)
- wspcoerce (GitHub)
- pretender (GitHub)
- NTLM reflection is dead, long live NTLM reflection! – An in-depth analysis of CVE-2025-33073
20250617
20250325
- Windows Kernel Pool Memory
- Kernel Callback Removal
- CimFS: Crashing in memory, Finding SYSTEM (Kernel Edition)
20250318
20250317
20250311
- Hacking the Xbox 360 Hypervisor Part 1: System Overview
- Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit
- LSA Secrets: revisiting secretsdump
20250306
20250305
- Physmem E: When Kernel Drivers Peek Into Memory
- Red Team Tactics: Combining Direct System Calls and SRDI to Bypass AV/EDR
- Structured Exception Handler x64
- Windows Access Tokens
- How to Write a Local PE Loader from Scratch for Educational Purposes
- Voidgate: How to Execute Shellcode While Keeping It Encrypted
- Hardware Breakpoints
- A Different Take on DLL Hijacking
- Using Syscalls Directly from Visual Studio to Bypass AVs/EDRs
- Living Dangerously with Module Stomping: Leveraging Code Coverage Analysis for Injecting into Legitimately Loaded DLLs
- Kernel Driver Exploit: System Mechanic