Category: zerosalarium

Operational Security (OPSEC) Basic Guide for Windows Users
09
Mar
2026

Operational Security (OPSEC) Basic Guide for Windows Users

I. Introduction This is one in a series of my articles on the configuration operations and how to use Windows…

windows virtual machines
09
Mar
2026

OPSEC Basic: Virtualization Technology

  I. Introduction This time, I will introduce the use of virtualization technology to mitigate potential threat models when using…

hacker osint username nad pc name
09
Mar
2026

OPSEC Basic Awareness. Blend into the background

I. Introduction Typically, how do you choose your Username and set your PC name? Some people use their real names,…

Trust, but verify. PE File Digital Signature
09
Mar
2026

Look before you leap: PE File Digital Signature

I. Introduction When using a computer with the Windows operating system, downloading and running executable files occurs frequently. But how…

cute redteam girl
09
Mar
2026

LOLBIN / LOLBAS – WinGet execute PowerShell script

I. Introduction In this article, I will provide a brief overview of the Windows Package Manager – WinGet. Following that,…

girl using defender
09
Mar
2026

Simple way to Turn Off / Disable Windows Defender

  I. Introduction I will guide you through two methods on how to stop Defender that I have tested and…

100 CPU overheat laptop
09
Mar
2026

Silver Bullet for High Processor Usage Issues

I. Introduction Is your computer as hot as a frying pan full of boiling oil due to high CPU consumption…

blind EDR post logo
08
Mar
2026

BYOVD to the next level. Blind EDR with Windows Symbolic Link

 I. INTRODUCTION In this article, I will introduce you to a completely new method of exploiting the BYOVD technique. I…

Path Masquerading logo
08
Mar
2026

Path masquerading: Hide in plain sight

I. INTRODUCTION With low privileges as a normal user, how will you fly under the radar of Endpoint Detection and…

long filename pentester trick cover image
08
Mar
2026

Out of sight, out of mind with Windows Long File Names

  I. INTRODUCTION One of the very important issues that red teamers and pentester always have to consider is how to…

fake command line of process 2
08
Mar
2026

Windows Process Command Line Spoofing Through Symbolic Link

I. INTRODUCTION Endpoint Detection & Response (EDR) systems often use the ProcessParameters field of the Process Environment Block (PEB) to…

PPL process overwrite EDR post
08
Mar
2026

Countering EDRs With The Backing Of Protected Process Light (PPL)

  I. INTRO Important or sensitive processes of modern Windows operating systems are now protected by the Protected Process Light…