core-jmp

core-jmp

death of core jump

  • Home
  • About
  • Privacy Policy

Homewindows

Posts in category: windows

Bypassing Detections with Command-Line Obfuscation

Bypassing Detections with Command-Line Obfuscation

March 9, 2026
by oxfemale AntivirusBypassingcmdEDRpowershellwindows

How attackers can bypass AV and EDR detections by obfuscating command-line arguments. By exploiting parsing quirks in executables, small changes to parameters can hide malicious intent while the command still executes normally.

Read More
Investigating Windows File System Artifacts Under C:\Windows

Investigating Windows File System Artifacts Under C:\Windows

March 9, 2026
by oxfemale DFIRwindows

The article explores forensic artifacts stored under the C:\Windows directory in Windows 10 and 11. It explains how system files and OS-generated traces can reveal executed programs, user activity, and potential data exfiltration during forensic investigations.

Read More
Reversing BEDaisy.sys: Static Analysis of BattlEye's Kernel Anti-Cheat Driver

Reversing BEDaisy.sys: Static Analysis of BattlEye’s Kernel Anti-Cheat Driver

March 9, 2026
by oxfemale APCDebugkernel-modewinapiWinDBGwindows

The article analyzes the Windows kernel driver BEDaisy.sys, used by BattlEye anti-cheat. Through static reverse engineering, it explores driver architecture, APC usage, hardware fingerprinting, import handling, and detection mechanisms used to monitor system activity.

Read More
Windows Local Privilege Escalation through the bitpixie Vulnerability

Windows Local Privilege Escalation through the bitpixie Vulnerability

March 5, 2026
by oxfemale BitLockerEscalationexploitationPBAPrivilegePXEQEMUSecure BootTPMwindows

The article explains the Bitpixie vulnerability in Windows Boot Manager that allows attackers to bypass BitLocker encryption. By abusing a PXE soft reboot flaw, the BitLocker key remains in memory, enabling extraction of the VMK and potential privilege escalation.

Read More
EDR-Redir V2: Blind EDR With Fake Program Files

EDR-Redir V2: Blind EDR With Fake Program Files

March 3, 2026
by oxfemale AntivirusBypassingDefenderEDRwindows

A technique leveraging Windows bind link features to redirect and loop parent folders (like Program Files/ProgramData) so an EDR sees attacker-controlled files as its own, enabling stealthy evasion and potential DLL hijacks.

Read More
Defeating Windows DEP Using ROP Chains Leveraging VirtualAlloc

Defeating Windows DEP Using ROP Chains Leveraging VirtualAlloc

March 2, 2026
by oxfemale buffer overflowDebugDEPexploitationROPshellcodeWinDBGwindows

Uses manual Return-Oriented Programming (ROP) to chain existing code fragments and call VirtualAlloc, changing memory permissions to bypass Windows DEP and then execute shellcode in exploited process memory.

Read More
Total Recall – Retracing Your Steps Back to NT AUTHORITY\SYSTEM

Total Recall – Retracing Your Steps Back to NT AUTHORITY\SYSTEM

March 2, 2026
by oxfemale DebugEscalationexploitationPoCPrivilegeuser-modewindows

A Windows elevation-of-privilege flaw in the Recall scheduled task let low-privileged users trigger it via WNF and abuse unsafe directory cleanup to execute arbitrary actions as NT AUTHORITY\SYSTEM.

Read More
Using ReadFile with Handle of Opened .blf Log File Produces an Unrecoverable State in CLFS.sys Causing a BSoD

Using ReadFile with Handle of Opened .blf Log File Produces an Unrecoverable State in CLFS.sys Causing a BSoD

February 26, 2026
by oxfemale BSoDCLFSDriverexploitationPoCwinapiwinapiWinDBGwindows

CVE-2026-2636 Logic bug in Windows’ CLFS driver: calling ReadFile on a .blf log handle pushes CLFS.sys into an unrecoverable state and triggers an immediate BSoD — local DoS with only user privileges.

Read More
Multiple vulnerabilities in CPSD CryptoPro Secure Disk for BitLocker

Multiple vulnerabilities in CPSD CryptoPro Secure Disk for BitLocker

February 25, 2026
by oxfemale BitLockerCryptoProexploitationPoCwindows

SEC Consult found two high-impact vulnerabilities in CryptoPro Secure Disk for BitLocker (<7.6.6/7.7.1). An attacker with physical access can bypass integrity checks to gain root access (CVE-2025-10010) and read sensitive network data stored in cleartext. Patches are available.

Read More
Hacking a stolen laptop: bypassing Windows security (BitLocker etc.) using PCI connector.

Hacking a stolen laptop: bypassing Windows security (BitLocker etc.) using PCI connector.

February 24, 2026
by oxfemale BitLockerBypassingDMAPCITPM

The article outlines security researcher Pierre-Nicolas Allard-Coutu’s demonstration of attacking a stolen Windows laptop using a PCIe connector to bypass protections like BitLocker, TPM, and Kernel DMA Protection, showing how to gain SYSTEM access.

Read More
  • First
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
  • Last

Recent Posts

  • Crimes against NTDLL – Implementing Early Cascade Injection
  • How Kernel Anti-Cheats Work: A Deep Dive into Modern Game Protection
  • Active Directory Security Assessment: Password Spraying, Privilege Escalation, and Kerberoasting
  • Reverse engineering undocumented Windows Kernel features to work with the EDR
  • Silent Harvest: Extracting Windows Secrets Under the Radar

Recent Comments

No comments to show.

Archives

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • September 2025

Categories

  • access
  • ACE
  • ACL
  • Active Directory
  • AD CS
  • Administrator
  • alloc
  • ALPC
  • Antivirus
  • APC
  • ASM
  • ASR
  • attaks
  • Audio
  • AV
  • BitLocker
  • Bluetooth
  • BSoD
  • buffer overflow
  • BYOVD
  • Bypassing
  • Cache
  • Callbacks
  • CLFS
  • cmd
  • Containers
  • cpp
  • CPU
  • Credential Attacks
  • Crypt
  • Cryptography
  • CryptoPro
  • Debug
  • Defender
  • DEP
  • DFIR
  • DMA
  • Driver
  • dump
  • EDR
  • Encryption
  • Escalation
  • ESP32
  • Evasion
  • Eventlog
  • exploitation
  • filesystem
  • firmware
  • Flash
  • Gadgets
  • GATT
  • Ghidra
  • Hardware
  • impact
  • Injection
  • IoT
  • kernel
  • kernel-mode
  • Library
  • Linux
  • LNK
  • Loader
  • LSA
  • Malware
  • MS-DOS
  • MS-EVEN
  • MS-LSAD
  • MS-SAMR
  • Network
  • PBA
  • PCI
  • PEB
  • Penetration Testing
  • Plugins
  • PoC
  • powershell
  • powershell
  • PPL
  • Privilege
  • Protection
  • PXE
  • QEMU
  • RCE
  • RedTeam
  • Registry
  • Reverse Engineering
  • root
  • ROP
  • RPC
  • Rust
  • SAM
  • Secure Boot
  • Security
  • shellcode
  • Shortcut
  • STM32H5
  • TEB
  • Telegram
  • TPM
  • UAC
  • UART
  • Uncategorized
  • user-mode
  • Warbird
  • WASM
  • winapi
  • winapi
  • WinDBG
  • windows
Log in
© 2026 core-jmp. All rights reserved.
Shopping Basket