core-jmp

core-jmp

death of core jump

  • Home
  • windows
  • Reverse Engineering
  • exploitation
  • shellcode
  • About
  • Privacy Policy

Home

All posts by : oxfemale

Backup to SYSTEM: Exploiting the IDrive Client Privilege Escalation Flaw

Backup to SYSTEM: Exploiting the IDrive Client Privilege Escalation Flaw

March 27, 2026
by oxfemale EscalationPrivilegewindows

CVE-2026-1995 is a privilege escalation flaw in the IDrive Windows backup client. Weak file permissions allow low-privileged users to modify service arguments and execute arbitrary code as SYSTEM.

Read More
Breaking the Firmware Trust: Disabling Security in a Locked BIOS

Breaking the Firmware Trust: Disabling Security in a Locked BIOS

March 27, 2026
by oxfemale BIOSBitLockerDMAfirmwareHardwareSPI FlashUEFIwindows

The article shows how modifying UEFI firmware at the flash level can disable BIOS security features even when the interface is locked, enabling DMA attacks that bypass protections and lead to SYSTEM-level access.

Read More
Stealth Injection with ROP: Thread Hijacking Without Executable Memory

Stealth Injection with ROP: Thread Hijacking Without Executable Memory

March 27, 2026
by oxfemale EDRInjectionRedTeamROPwinapiwindows

The article presents T(ROP)H, a process injection technique that hijacks threads and uses a ROP chain to load a DLL without allocating executable memory, reducing common detection indicators used by EDR systems.

Read More
Relaying Trust: Exploiting NTLM Authentication to Compromise Active Directory

Relaying Trust: Exploiting NTLM Authentication to Compromise Active Directory

March 26, 2026
by oxfemale Active DirectoryContainersImpacketKerberosLDAP RelayNetworkNTLM RelaySecuritywindows

he article demonstrates an NTLM relay attack against Active Directory using tools like ntlmrelayx and PetitPotam. By relaying authentication to LDAP, attackers can create accounts, abuse delegation, and gain administrative access.

Read More
When DNS Forwarding Meets Recursion: Understanding Conditional Forwarders in Windows

When DNS Forwarding Meets Recursion: Understanding Conditional Forwarders in Windows

March 26, 2026
by oxfemale Active DirectoryDNSpowershellpowershellwindows

The article explains how Windows DNS conditional forwarders interact with recursion. It shows that recursion settings can be overridden per zone and demonstrates how different DNS configurations affect query resolution.

Read More
Out-of-Cancel: A New Linux Kernel Race Condition Bug Class

Out-of-Cancel: A New Linux Kernel Race Condition Bug Class

March 25, 2026
by oxfemale Exploit Developmentexploitationkernel-modeLinuxRace ConditionUse-After-Free

The article introduces the Out-of-Cancel vulnerability class in the Linux kernel, where workqueue cancellation APIs fail to guarantee object lifetime. This race can lead to Use-After-Free bugs, demonstrated using espintcp (CVE-2026-23239).

Read More
Breaking the Flat Network: How Tiering Models Protect Active Directory

Breaking the Flat Network: How Tiering Models Protect Active Directory

March 25, 2026
by oxfemale Active DirectoryActive DirectoryBlue teamNetworkPenetration TestingPrivilegeSecuritywindows

The article explains how flat enterprise networks enable easy lateral movement and domain compromise. It shows how Active Directory tiering models segment privileges and systems to prevent attackers from escalating access.

Read More
From PCAP to Passwords: Automating Kerberos Roast Extraction

From PCAP to Passwords: Automating Kerberos Roast Extraction

March 25, 2026
by oxfemale Active DirectoryCredential AttacksKerberosRedTeam

Krb5RoastParser is a Python tool that extracts Kerberos authentication hashes from PCAP traffic and converts them into Hashcat-compatible formats, simplifying Kerberoasting and Kerberos password-cracking workflows.

Read More
Ghost in LSASS: Inside the KslKatz Credential Dumping Framework

Ghost in LSASS: Inside the KslKatz Credential Dumping Framework

March 25, 2026
by oxfemale BYOVDBypassingCredential Attackskernelkernel-modeLSASSRedTeamwindows

KslKatz is a Windows credential-dumping tool that reads LSASS memory using a kernel driver to bypass user-mode protections. It merges techniques from KslDump and GhostKatz to extract authentication secrets with improved stealth.

Read More
Breaking the Shield: Unpacking a VMProtected Windows Kernel Driver

Breaking the Shield: Unpacking a VMProtected Windows Kernel Driver

March 25, 2026
by oxfemale DebugDriverkernelkernel-modePythonReverse EngineeringVMProtectWinDBGwindows

A technical walkthrough showing how to unpack a VMProtected Windows kernel driver using WinDbg and dynamic analysis. The guide demonstrates restoring the hidden Import Address Table and dumping a clean driver for reverse engineering.

Read More
  • First
  • Previous
  • 1
  • ...
  • 4
  • 5
  • 6
  • 7
  • 8
  • ...
  • 15
  • Next
  • Last

Recent Posts

  • 89 vulnerabilities in XAPI / Citrix XenServer
  • Patchless AMSI Bypass via Page Guard Exceptions
  • A Step-by-Step Guide to Uncovering Vulnerabilities in a Mobile App
  • How Kernel Anti-Cheats Work: A Deep Dive into Modern Game Protection
  • A Shortcut to Coercion: Incomplete Patch of APT28’s Zero-Day Leads to CVE-2026-32202

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • September 2025

Active Directory Active Directory Security Application Security byovd bypass cpp EDR EDR Bypass EDR Evasion EDREvasion Embedded Security Endpoint Security Exploit Development Firmware Reverse Engineering Hardware Hacking Hardware Security injection IoT Security Kernel Debugging Kernel Exploitation macOS Security Malware Analysis Malware Development Memory Corruption Offensive Security Post-Exploitation PPL Privilege Escalation Process Injection red team RedTeam Red Teaming Red Team Techniques remote code execution Reverse Engineering Security Research shellcode Vulnerability Research WinDBG windows Windows 11 Windows Internals Windows Kernel Windows security WindowsSecurity

Categories

  • .NET
  • access
  • ACE
  • ACL
  • Active Directory
  • Active Directory
  • AD CS
  • Administrator
  • AI Agents
  • AI Security Research
  • alloc
  • ALPC
  • AMSI
  • Android
  • Antivirus
  • Apache Tomcat
  • APC
  • Apple Silicon
  • ASM
  • ASR
  • attaks
  • Audio
  • AV
  • BIOS
  • BitLocker
  • Blue team
  • Bluetooth
  • Boot ROM
  • Broadcom
  • BSoD
  • buffer overflow
  • BYOUD
  • BYOVD
  • Bypassing
  • Cache
  • Callbacks
  • Camera
  • CI/CD
  • CIMOM
  • Cisco
  • Citrix
  • Claude AI
  • CLFS
  • cmd
  • COM
  • Command Injection
  • Containers
  • Copilot
  • Cortex XDR
  • CPL
  • cpp
  • CPU
  • Credential Attacks
  • Crypt
  • Cryptography
  • CryptoPro
  • CSRF
  • DCOM
  • Debug
  • Defender
  • DEP
  • Deserialization
  • DFIR
  • DLL Sideloading
  • DMA
  • DNS
  • Driver
  • dump
  • EDR
  • Embedded
  • Encryption
  • Escalation
  • ESP32
  • ESXi
  • Evasion
  • Eventlog
  • Exploit Development
  • exploitation
  • filesystem
  • firmware
  • Flash
  • FreeBSD
  • Gadgets
  • GATT
  • Ghidra
  • Hardware
  • Hooking
  • Hyper-V
  • Hypervisor
  • Impacket
  • impact
  • Injection
  • IOCTL
  • IoT
  • IPC
  • IRP
  • Java
  • JIT
  • JWT Security
  • Kerberos
  • kernel
  • kernel-mode
  • LDAP Relay
  • Library
  • Linux
  • LLM
  • LLM Exploit Development
  • LNK
  • Loader
  • LOLExfil
  • LSA
  • LSASS
  • Machine Learning
  • MacOS
  • Malware
  • MCP
  • MS-DOS
  • MS-EVEN
  • MS-LSAD
  • MS-SAMR
  • Network
  • NTLM Relay
  • NVMe
  • ODR
  • Palo Alto
  • PBA
  • PCI
  • PEB
  • Penetration Testing
  • PHP
  • pipe
  • Plugins
  • PoC
  • powershell
  • powershell
  • PPL
  • Privilege
  • Privilege Escalation
  • Protection
  • PXE
  • Python
  • QEMU
  • Race Condition
  • radare2
  • RCE
  • Recall
  • Recovery mode
  • RedTeam
  • Registry
  • Reverse Engineering
  • root
  • ROP
  • RPC
  • RTTI
  • Rust
  • SAM
  • Secure Boot
  • Security
  • Security
  • shellcode
  • Shortcut
  • SPI Flash
  • Stack Overflow
  • STM32H5
  • TCP/IP
  • TEB
  • Telegram
  • Telnetd
  • TPM
  • UAC
  • UART
  • UEFI
  • Uncategorized
  • USB
  • Use-After-Free
  • user-mode
  • Virtualization
  • VMProtect
  • VMware
  • Warbird
  • WASM
  • WEB
  • winapi
  • winapi
  • WinDBG
  • windows
  • Windows Admin Center
  • Winsock
  • WMI
  • WML
  • Wordpress
  • WSL
  • XenServer
  • Xiaomi
  • XML
  • XNU Kernel
  • XSS
  • XXE
Log in
    © 2026 core-jmp. All rights reserved.
    Shopping Basket