Top Categories

Spotlight

todayJanuary 2, 2024

Red Teaming + Social Engineering krptyk

Reverse Proxy Phishing With Evilginx

Reverse proxy phishing with Evilginx is a technique where a phishing site acts as a proxy server, intercepting legitimate requests and forwarding them to the genuine website while capturing sensitive information from users. This approach allows us to create convincing phishing campaigns by seamlessly proxying the target site, making it [...]


Cyber Security

5 Results / Page 1 of 1

Background

todayOctober 28, 2023

  • 1
close

Cyber security + Red Teaming + Penetration Testing krptyk

Behind the Chrome Vault: A Guide to Stealing Cookies

This post is a continuation on the chrome decryption series. Previously I walked through how we can exfiltrate and decrypt the login data (credentials) from a users chrome browser. While capturing login data is a treasure trove of info, there’s another dimension to this exploration: cookies. Cookies, those seemingly innocuous ...

todaySeptember 20, 2023

close

Cyber security + Penetration Testing krptyk

Creating a DLL Shellcode Loader in Golang to Bypass Defender: A Step-by-Step Guide

In today’s blog post, we are going to explore the creation and functioning of a dynamic shellcode loader tailored for Windows. This loader is instrumental in bypassing specific security measures in Windows environments. Before we dive in, it is crucial to note that this tutorial is for educational purposes only ...