Welcome to CipherPodliq's den of cyber espionage and security research. Here, we dive into the shadows of the digital realm, unraveling the art of offensive security and the science of malware development. Explore the depths of my research and findings below. You can contact me at [email protected]
- TU-Sofia
- Rust Programming
- Подготовка за PCEP
- Initial Access
- Code Execution
- Code & Process Injection
- Defense Evasion
- Enumeration and Discovery
- Privilege Escalation
- Credential Access & Dumping
- Lateral Movement
- Persistence
- Exfiltration
- Malware Development
- Forensic Analysis
- Security Tools
Документирам подготовката си за PCEP сертификат, като по този начин помагам на други които се подготвят за изпита.:
The gateway to your target. Discover methods to breach systems and gain that crucial first foothold:
- Phishing Techniques
- Vulnerability Exploitation
- Password Cracking
Execute your payloads with precision. Dive into methods for running code on compromised systems:
- Remote Code Execution (RCE)
- Local Code Execution
- Bypassing Execution Controls
Master the craft of injecting code and processes. This section covers various injection techniques:
- DLL Injection
- Process Hollowing
- Code Injection via APIs
Evade detection and bypass security mechanisms. Explore strategies to remain undetected:
- Anti-Virus Evasion
- Rootkit Techniques
- Obfuscation
Gather intelligence on your target. Learn how to enumerate and discover critical information:
- Network Scanning
- Service Enumeration
- System Fingerprinting
Rise through the ranks. Discover techniques for elevating privileges and gaining higher access levels:
- Exploiting Vulnerabilities
- Privilege Escalation Exploits
- Misconfigured Permissions
Access and extract valuable credentials. Techniques for obtaining and dumping sensitive data:
- Password Hash Extraction
- Credential Dumping Tools
- Credential Reuse
Move stealthily across networks. Understand strategies for moving laterally within a target environment:
- Pass-the-Hash
- Remote Desktop Protocol (RDP) Exploits
- Exploiting Trust Relationships
Maintain your foothold. Explore methods for ensuring long-term access and persistence:
- Creating Backdoors
- Registry Persistence
- Scheduled Tasks
Steal away with the loot. Learn about methods and channels for data exfiltration:
- Data Exfiltration Channels
- Encryption and Obfuscation
- Cloud Storage Solutions
Delve into the world of malware. Analyze and develop malware with a focus on:
- Crypters and Packers
- Reverse Engineering
- Anti-Analysis Techniques
Uncover the truth. Explore forensic techniques for analyzing digital evidence:
- Memory Forensics
- Disk Forensics
- Incident Response
Equip yourself with the best tools. A curated list of utilities for various security tasks:
- Penetration Testing Tools
- Forensic Analysis Tools
- Network Monitoring Tools
Feel free to navigate through each section and immerse yourself in the world of cybersecurity and malware research. Your feedback and insights are always welcome!
Disclaimer: All content is intended for educational purposes and responsible use only. Use the knowledge gained here ethically and legally.