Security Research
Technical insights from security engagements.
Featured Research
Enterprise EDR Evasion Techniques
Advanced red team methodologies for enterprise environments
Analysis of modern EDR bypass techniques including DLL unhooking, AMSI evasion, and manual mapping approaches tested against enterprise-grade security solutions.
Multi-Cloud Attack Vectors: AWS and Azure
Privilege escalation techniques across cloud platforms
Practical demonstration of cloud misconfigurations and privilege escalation paths using vulnerable cloud environments to understand real-world attack vectors.
AWS Cross-Account Database Access
Infrastructure security and cloud architecture
Achieving cross-account database access through VPC peering and IAM configuration for enterprise multi-account architectures.
Red Team Lab Environment Setup
Reproducible attack simulation infrastructure
Building stable, reproducible red team lab environments for testing attack scenarios and defensive capabilities.