Skip to content

cipherpodliq1/cipherpodliq1.github.io

Repository files navigation

CipherPodliq's Security Research Blog

Welcome to CipherPodliq's den of cyber espionage and security research. Here, we dive into the shadows of the digital realm, unraveling the art of offensive security and the science of malware development. Explore the depths of my research and findings below. You can contact me at [email protected]

Table of Contents

TU-Sofia

Rust-Programming

Подготовка-за-PCEP

Документирам подготовката си за PCEP сертификат, като по този начин помагам на други които се подготвят за изпита.:

Initial Access

The gateway to your target. Discover methods to breach systems and gain that crucial first foothold:

  • Phishing Techniques
  • Vulnerability Exploitation
  • Password Cracking

Code Execution

Execute your payloads with precision. Dive into methods for running code on compromised systems:

  • Remote Code Execution (RCE)
  • Local Code Execution
  • Bypassing Execution Controls

Code & Process Injection

Master the craft of injecting code and processes. This section covers various injection techniques:

  • DLL Injection
  • Process Hollowing
  • Code Injection via APIs

Defense Evasion

Evade detection and bypass security mechanisms. Explore strategies to remain undetected:

  • Anti-Virus Evasion
  • Rootkit Techniques
  • Obfuscation

Enumeration and Discovery

Gather intelligence on your target. Learn how to enumerate and discover critical information:

  • Network Scanning
  • Service Enumeration
  • System Fingerprinting

Privilege Escalation

Rise through the ranks. Discover techniques for elevating privileges and gaining higher access levels:

  • Exploiting Vulnerabilities
  • Privilege Escalation Exploits
  • Misconfigured Permissions

Credential Access & Dumping

Access and extract valuable credentials. Techniques for obtaining and dumping sensitive data:

  • Password Hash Extraction
  • Credential Dumping Tools
  • Credential Reuse

Lateral Movement

Move stealthily across networks. Understand strategies for moving laterally within a target environment:

  • Pass-the-Hash
  • Remote Desktop Protocol (RDP) Exploits
  • Exploiting Trust Relationships

Persistence

Maintain your foothold. Explore methods for ensuring long-term access and persistence:

  • Creating Backdoors
  • Registry Persistence
  • Scheduled Tasks

Exfiltration

Steal away with the loot. Learn about methods and channels for data exfiltration:

  • Data Exfiltration Channels
  • Encryption and Obfuscation
  • Cloud Storage Solutions

Malware Development

Delve into the world of malware. Analyze and develop malware with a focus on:

  • Crypters and Packers
  • Reverse Engineering
  • Anti-Analysis Techniques

Forensic Analysis

Uncover the truth. Explore forensic techniques for analyzing digital evidence:

  • Memory Forensics
  • Disk Forensics
  • Incident Response

Security Tools

Equip yourself with the best tools. A curated list of utilities for various security tasks:

  • Penetration Testing Tools
  • Forensic Analysis Tools
  • Network Monitoring Tools

Feel free to navigate through each section and immerse yourself in the world of cybersecurity and malware research. Your feedback and insights are always welcome!


Disclaimer: All content is intended for educational purposes and responsible use only. Use the knowledge gained here ethically and legally.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published