Research & Insights

Security Research

Technical insights from security engagements.


Enterprise EDR Evasion Techniques

Advanced red team methodologies for enterprise environments

Analysis of modern EDR bypass techniques including DLL unhooking, AMSI evasion, and manual mapping approaches tested against enterprise-grade security solutions.

Read Article →


Multi-Cloud Attack Vectors: AWS and Azure

Privilege escalation techniques across cloud platforms

Practical demonstration of cloud misconfigurations and privilege escalation paths using vulnerable cloud environments to understand real-world attack vectors.

AWS Article →
Azure Article →


AWS Cross-Account Database Access

Infrastructure security and cloud architecture

Achieving cross-account database access through VPC peering and IAM configuration for enterprise multi-account architectures.

Read Article →


Red Team Lab Environment Setup

Reproducible attack simulation infrastructure

Building stable, reproducible red team lab environments for testing attack scenarios and defensive capabilities.

Read Article →