core-jmp

core-jmp

death of core jump

  • Home
  • About
  • Privacy Policy

Home

All posts by : oxfemale

RPC Proxy Injection Part II: Breaking Elastic EDR Telemetry

RPC Proxy Injection Part II: Breaking Elastic EDR Telemetry

February 23, 2026
by oxfemale BypassingcppEDRexploitationInjectionLibraryRedTeamRPCSecurityshellcodeuser-modewinapiwinapiwindows

The article explains enhancing RPC Proxy Injection to evade Elastic EDR telemetry by avoiding common API calls like WriteProcessMemory and CreateRemoteThread, using custom shellcode delivery via thread descriptions and APCs to hide malicious behavior.

Read More
Living off the Process

Living off the Process

February 23, 2026
by oxfemale BypassingEDRexploitationInjectionRCESecurityshellcodewindows

The article “Living off the Process” details a technique to inject and execute shellcode into a remote Windows process by reusing existing RWX memory, ROP gadgets, and threads within that process, avoiding conventional memory allocation and lowering detection footprint.

Read More
EDR-Freeze: A Tool That Puts EDRs And Antivirus Into A Coma State

EDR-Freeze: A Tool That Puts EDRs And Antivirus Into A Coma State

February 23, 2026
by oxfemale AntivirusBypassingdumpEDRexploitationuser-modewindows

The article presents EDR-Freeze, a user-mode tool exploiting Windows Error Reporting to suspend EDR and antivirus processes by abusing MiniDumpWriteDump and WerFaultSecure, leaving security agents in a “coma” and creating a blind spot for attacks.

Read More
Bypassing Elastic EDR to Perform Lateral Movement

Bypassing Elastic EDR to Perform Lateral Movement

February 23, 2026
by oxfemale ASRBypassingEDRSecuritywindows

Article demonstrates how lateral movement can still be achieved in a lab with Elastic EDR and Microsoft ASR enabled by modifying payload delivery and execution techniques, bypassing common detection patterns and highlighting gaps in behavior-based defenses.

Read More
EventLog-in: Propagating With Weak Credentials Using the Eventlog Service in Microsoft Windows

EventLog-in: Propagating With Weak Credentials Using the Eventlog Service in Microsoft Windows (CVE-2025-29969)

February 23, 2026
by oxfemale Active DirectoryEventlogimpactMS-EVENNetworkRCERPCwindows

SafeBreach Labs disclosed a critical RCE in the MS-EVEN RPC service (CVE-2025-29969) that lets low-privilege users write arbitrary files remotely on Windows 11/Server 2025, bypassing share limits. Patched May 2025.

Read More
image

Website Update: Enhancing Security and Performance

February 23, 2026
by oxfemale Linux

server global update

Read More

ALPC Uncovered: The Hidden Backbone of Local RPC in Windows 11 and Server 2025

February 23, 2026
by oxfemale ALPCkernelRPCwinapiwindows

This article explores ALPC in Windows 11 and Windows Server 2025, covering hardened server design, message attributes, section-based transfer, and its role in Local RPC. It also analyzes ALPC as a security boundary and attack surface.

Read More
CVE-2026-20817 - Windows Error Reporting (WER) ALPC Privilege Escalation

Analysis of Improper Authorization in Windows Error Reporting CVE-2026-20817 (PoC)

February 18, 2026
by oxfemale ALPCcppEscalationexploitationPoCPrivilegewinapiwindows

Proof-of-Concept (PoC) for CVE-2026-20817, a local privilege escalation vulnerability in the Windows Error Reporting (WER) service. The vulnerability allows an authenticated low-privileged user to execute arbitrary code with SYSTEM privileges by sending specially crafted ALPC messages to the WER service.

Read More
Windows Access Masks

Looking into Windows Access Masks

February 18, 2026
by oxfemale accessACEACLwindows

Access masks are 32-bit permission values defining what operations a handle or security descriptor allows. The article breaks down standard, specific, and generic rights, explains ACE usage, and shows how Windows enforces access checks internally.

Read More
Снимок экрана 2026-02-16 в 21.17.28

Trust Me, I’m a Shortcut

February 16, 2026
by oxfemale BypassingEvasionLNKProtectionSecurityShortcutwindows

LNK shortcut abuse remains effective because shortcuts are trusted and rarely inspected. The technique enables stealthy execution and strong phishing scenarios. Its future use is likely in initial access and evasion until detection improves.

Read More
  • First
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
  • Last

Recent Posts

  • Crimes against NTDLL – Implementing Early Cascade Injection
  • How Kernel Anti-Cheats Work: A Deep Dive into Modern Game Protection
  • Active Directory Security Assessment: Password Spraying, Privilege Escalation, and Kerberoasting
  • Reverse engineering undocumented Windows Kernel features to work with the EDR
  • Silent Harvest: Extracting Windows Secrets Under the Radar

Recent Comments

No comments to show.

Archives

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • September 2025

Categories

  • access
  • ACE
  • ACL
  • Active Directory
  • AD CS
  • Administrator
  • alloc
  • ALPC
  • Antivirus
  • APC
  • ASM
  • ASR
  • attaks
  • Audio
  • AV
  • BitLocker
  • Bluetooth
  • BSoD
  • buffer overflow
  • BYOVD
  • Bypassing
  • Cache
  • Callbacks
  • CLFS
  • cmd
  • Containers
  • cpp
  • CPU
  • Credential Attacks
  • Crypt
  • Cryptography
  • CryptoPro
  • Debug
  • Defender
  • DEP
  • DFIR
  • DMA
  • Driver
  • dump
  • EDR
  • Encryption
  • Escalation
  • ESP32
  • Evasion
  • Eventlog
  • exploitation
  • filesystem
  • firmware
  • Flash
  • Gadgets
  • GATT
  • Ghidra
  • Hardware
  • impact
  • Injection
  • IoT
  • kernel
  • kernel-mode
  • Library
  • Linux
  • LNK
  • Loader
  • LSA
  • Malware
  • MS-DOS
  • MS-EVEN
  • MS-LSAD
  • MS-SAMR
  • Network
  • PBA
  • PCI
  • PEB
  • Penetration Testing
  • Plugins
  • PoC
  • powershell
  • powershell
  • PPL
  • Privilege
  • Protection
  • PXE
  • QEMU
  • RCE
  • RedTeam
  • Registry
  • Reverse Engineering
  • root
  • ROP
  • RPC
  • Rust
  • SAM
  • Secure Boot
  • Security
  • shellcode
  • Shortcut
  • STM32H5
  • TEB
  • Telegram
  • TPM
  • UAC
  • UART
  • Uncategorized
  • user-mode
  • Warbird
  • WASM
  • winapi
  • winapi
  • WinDBG
  • windows
Log in
© 2026 core-jmp. All rights reserved.
Shopping Basket