core-jmp

core-jmp

death of core jump

  • Home
  • About
  • Privacy Policy

Homewindows

Posts in category: windows

Crimes against NTDLL - Implementing Early Cascade Injection

Crimes against NTDLL – Implementing Early Cascade Injection

March 14, 2026
by oxfemale attaksBypassingEDRInjectionRustwinapiwinapiwindows

How to implement Early Cascade Injection in Rust, a stealthy Windows process injection technique that hijacks shim engine callbacks in ntdll to execute shellcode during early process initialization, before many EDR hooks activate.

Read More
How Kernel Anti-Cheats Work: A Deep Dive into Modern Game Protection

How Kernel Anti-Cheats Work: A Deep Dive into Modern Game Protection

March 14, 2026
by oxfemale Debugkernelkernel-modeReverse Engineeringwindows

The article explains how modern kernel-level anti-cheat systems work, describing their driver architecture, callbacks, memory monitoring, and detection methods used to identify cheats that operate at the same privilege level as the operating system kernel.

Read More
Active Directory Security Assessment: Password Spraying, Privilege Escalation, and Kerberoasting

Active Directory Security Assessment: Password Spraying, Privilege Escalation, and Kerberoasting

March 14, 2026
by oxfemale Active DirectoryCredential AttacksEscalationPenetration TestingPrivilegewindows

This article analyzes an Active Directory attack chain where password spraying reveals valid credentials, privileged accounts enable escalation, and Kerberoasting exposes service account hashes, demonstrating how weak credential management can lead to full domain compromise.

Read More
Reverse engineering undocumented Windows Kernel features to work with the EDR

Reverse engineering undocumented Windows Kernel features to work with the EDR

March 14, 2026
by oxfemale AntivirusBypassingDefenderEDREventlogkernelMalwareProtectionReverse EngineeringSecuritywinapiwinapiWinDBGwindows

This article demonstrates how to reverse engineer the Windows 11 kernel to understand undocumented internals behind memory operations and ETW Threat Intelligence events, helping security engineers improve EDR telemetry and detect remote process memory writes.

Read More
Silent Harvest: Extracting Windows Secrets Under the Radar

Silent Harvest: Extracting Windows Secrets Under the Radar

March 14, 2026
by oxfemale BypassingEDRLSAMS-LSADMS-SAMRpowershellpowershellSAMwinapiwinapiwindows

“Silent Harvest” explains how attackers can quietly extract sensitive Windows secrets such as credentials and security keys by abusing legitimate registry and system mechanisms, avoiding LSASS dumping and bypassing many common EDR detections.

Read More
RIP RegPwn: The Rise and Fall of a Windows Registry Exploitation Technique

RIP RegPwn: The Rise and Fall of a Windows Registry Exploitation Technique

March 13, 2026
by oxfemale EscalationexploitationPrivilegeRegistrywindows

The article explores a red-team research project called “RegPwn,” showing how weaknesses in Windows registry handling can be abused to achieve privilege escalation or persistence, and discusses why the technique has now been mitigated or rendered ineffective.

Read More
Exploiting a Kernel Read/Write Primitive using BYOVD

Exploiting a Kernel Read/Write Primitive using BYOVD

March 13, 2026
by oxfemale BYOVDcppDriverEDRexploitationkernelkernel-modeReverse EngineeringWinDBGwindows

The article explains how attackers exploit a vulnerable signed driver (BYOVD) to obtain a kernel read/write primitive. It shows how unsafe IOCTL handlers allow manipulating kernel memory and abusing driver functionality for offensive operations.

Read More
Windows Defender ACL Blocking: A Silent Technique With Serious Impact

Windows Defender ACL Blocking: A Silent Technique With Serious Impact

March 10, 2026
by oxfemale accessACLBypassingDefenderEDRRedTeamwindows

The article analyzes a technique that disables Microsoft Defender by modifying file ACLs to block security services from accessing critical system DLLs. This silent method prevents Defender from starting without triggering obvious alerts.

Read More
Malware and cryptography 44 - encrypt/decrypt payload via Discrete Fourier Transform. Simple C example.

Malware and cryptography 44 – encrypt/decrypt payload via Discrete Fourier Transform. Simple C example.

March 10, 2026
by oxfemale cppCryptographyEncryptionMalwarepowershellpowershellshellcodewindows

Demonstration how malware can encrypt and decrypt payloads using the Discrete Fourier Transform (DFT). It provides a simple C example showing how mathematical transforms can hide shellcode and help evade static signature-based detection.

Read More
Defeating a 40-year-old copy protection dongle

Defeating a 40-year-old copy protection dongle

March 9, 2026
by oxfemale ASMMS-DOSwinapiwindows

Reverse engineering a vintage hardware copy-protection dongle used by 1980s enterprise software. By analyzing the DOS program and emulator environment, the author discovered the dongle check and bypassed it with a tiny patch.

Read More
  • 1
  • 2
  • 3
  • ...
  • 5
  • Next
  • Last

Recent Posts

  • Crimes against NTDLL – Implementing Early Cascade Injection
  • How Kernel Anti-Cheats Work: A Deep Dive into Modern Game Protection
  • Active Directory Security Assessment: Password Spraying, Privilege Escalation, and Kerberoasting
  • Reverse engineering undocumented Windows Kernel features to work with the EDR
  • Silent Harvest: Extracting Windows Secrets Under the Radar

Recent Comments

No comments to show.

Archives

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • September 2025

Categories

  • access
  • ACE
  • ACL
  • Active Directory
  • AD CS
  • Administrator
  • alloc
  • ALPC
  • Antivirus
  • APC
  • ASM
  • ASR
  • attaks
  • Audio
  • AV
  • BitLocker
  • Bluetooth
  • BSoD
  • buffer overflow
  • BYOVD
  • Bypassing
  • Cache
  • Callbacks
  • CLFS
  • cmd
  • Containers
  • cpp
  • CPU
  • Credential Attacks
  • Crypt
  • Cryptography
  • CryptoPro
  • Debug
  • Defender
  • DEP
  • DFIR
  • DMA
  • Driver
  • dump
  • EDR
  • Encryption
  • Escalation
  • ESP32
  • Evasion
  • Eventlog
  • exploitation
  • filesystem
  • firmware
  • Flash
  • Gadgets
  • GATT
  • Ghidra
  • Hardware
  • impact
  • Injection
  • IoT
  • kernel
  • kernel-mode
  • Library
  • Linux
  • LNK
  • Loader
  • LSA
  • Malware
  • MS-DOS
  • MS-EVEN
  • MS-LSAD
  • MS-SAMR
  • Network
  • PBA
  • PCI
  • PEB
  • Penetration Testing
  • Plugins
  • PoC
  • powershell
  • powershell
  • PPL
  • Privilege
  • Protection
  • PXE
  • QEMU
  • RCE
  • RedTeam
  • Registry
  • Reverse Engineering
  • root
  • ROP
  • RPC
  • Rust
  • SAM
  • Secure Boot
  • Security
  • shellcode
  • Shortcut
  • STM32H5
  • TEB
  • Telegram
  • TPM
  • UAC
  • UART
  • Uncategorized
  • user-mode
  • Warbird
  • WASM
  • winapi
  • winapi
  • WinDBG
  • windows
Log in
© 2026 core-jmp. All rights reserved.
Shopping Basket