Category: zerosalarium
I. INTRO One of the daily tasks of Pentesters or Redteamers is to establish and maintain persistence to ensure…
I. INTRO During penetration testing or red team activities, the attackers are constantly pursued by Antivirus and Endpoint Detection and…
I. LEAD-IN As we know, after an attacker gains control of a machine on the network, the most common…
I. STARTER Currently, in addition to merely focusing on avoiding scrutiny from EDRs (Endpoint Detection and Response) and Antivirus, the…
Books Recommended by Zero Salarium Programming is the backbone of the digital world. If you want to sharpen your cybersecurity…
I. OVERVIEW During the penetration testing process or red team activities, attackers always need to find a safe spot to…
I. OVERVIEW Endpoint Detection and Response (EDR) always provides strong protection for its executable file locations. If an attacker…
I. INTRODUCTION In previous articles, I demonstrated using Windows’ bind link feature to block or redirect Antivirus/EDR from accessing…
I. OVERVIEW Continuing the series of studies on exploiting the Bindlink API to tamper with Antivirus/EDRs. This time, I…
I. LEAD-IN In the process of red-teaming, what we often do during lateral movement is perform remote execution through other…
I. STARTER When conducting penetration testing on target machines, our actions will be ruthlessly monitored and judged by Antivirus….
I. STARTER When conducting penetration testing on target machines, our actions will be ruthlessly monitored and judged by Antivirus….











