
Andres Roldan
An OffSec Exploitation Expert review
In this post, we review the EXP-401 course and OSEE certification offered by OffSec.

Andres Roldan
A hacker's view of the performance of Researcher CNAs
We've been a CNA for a while, and this is an analysis of our performance.

Andres Roldan
An OffSec Experienced Pentester review
In this post, we review the PEN-300 course and OSEP certification offered by OffSec.

Andres Roldan
A Certified Red Team Lead (CRTL) Review
In this post we review the RTO-2 course and CRTL certification offered by Zero-Point Security.

Andres Roldan
A Black Hat talk follow up
We will take a brief understanding at DirectX, a new attack surface on Hyper-V

Andres Roldan
Cross-process memory patching with Python
We will take AMSI bypass to another level by using cross-process memory injection.

Andres Roldan
Dynamic in-memory AMSI bypass
In this article we will be able to bypass AMSI using memory patching.

Andres Roldan
Replicating CVE-2021-3156 with AFL
In this article we will be able to reproduce the bug described on CVE-2021-3156 using fuzzing.

Andres Roldan
Local Privilege Escalation
In this article we will be able to perform a Local Privilege Escalation using an exploit to HEVD.