Technical Articles

Technical Articles

Security research and technical insights from cybersecurity engagements.


Enterprise EDR Evasion Techniques

Advanced red team methodologies for enterprise environments

Analysis of modern EDR bypass techniques including DLL unhooking, AMSI evasion, and manual mapping approaches tested against enterprise-grade security solutions.


IAM Hacking AWS: Multi-Cloud Attack Vectors

Privilege escalation techniques in AWS environments

Practical demonstration of AWS privilege escalation paths using real-world misconfigurations and IAM vulnerabilities through AWSGoat lab environment.


Azuredly Attacking Azure: Cloud Privilege Escalation

Azure RBAC and automation account exploitation

Using AzureGoat to demonstrate Azure privilege escalation through automation accounts and RBAC misconfigurations in cloud environments.


Cross-Account Database Access via VPC Peering and IAM

Infrastructure security and cloud architecture

Achieving cross-account database access through VPC peering and IAM configuration for enterprise multi-account AWS architectures.


Red Team Scenario Lab: Reproducible Attack Simulations

Reproducible attack simulation infrastructure

Building stable, reproducible red team lab environments for testing attack scenarios and defensive capabilities.


Research content represents independent analysis and is not affiliated with any specific client engagement.