Category: zerosalarium
I. Introduction This is one in a series of my articles on the configuration operations and how to use Windows…
I. Introduction This time, I will introduce the use of virtualization technology to mitigate potential threat models when using…
I. Introduction Typically, how do you choose your Username and set your PC name? Some people use their real names,…
I. Introduction When using a computer with the Windows operating system, downloading and running executable files occurs frequently. But how…
I. Introduction In this article, I will provide a brief overview of the Windows Package Manager – WinGet. Following that,…
I. Introduction I will guide you through two methods on how to stop Defender that I have tested and…
I. Introduction Is your computer as hot as a frying pan full of boiling oil due to high CPU consumption…
I. INTRODUCTION In this article, I will introduce you to a completely new method of exploiting the BYOVD technique. I…
I. INTRODUCTION With low privileges as a normal user, how will you fly under the radar of Endpoint Detection and…
I. INTRODUCTION One of the very important issues that red teamers and pentester always have to consider is how to…
I. INTRODUCTION Endpoint Detection & Response (EDR) systems often use the ProcessParameters field of the Process Environment Block (PEB) to…
I. INTRO Important or sensitive processes of modern Windows operating systems are now protected by the Protected Process Light…











