<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Wikis on Jesus Oseguera</title><link>https://r0tbyt3.dev/wiki/</link><description>Recent content in Wikis on Jesus Oseguera</description><generator>Hugo</generator><language>en-us</language><atom:link href="https://r0tbyt3.dev/wiki/index.xml" rel="self" type="application/rss+xml"/><item><title/><link>https://r0tbyt3.dev/wiki/labs/hackthebox/ai-and-ml-exploitation/ai-space/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/ai-and-ml-exploitation/ai-space/</guid><description/></item><item><title/><link>https://r0tbyt3.dev/wiki/labs/hackthebox/ai-and-ml-exploitation/fuel-crisis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/ai-and-ml-exploitation/fuel-crisis/</guid><description/></item><item><title/><link>https://r0tbyt3.dev/wiki/labs/hackthebox/ai-and-ml-exploitation/lost-in-hyperspace/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/ai-and-ml-exploitation/lost-in-hyperspace/</guid><description/></item><item><title/><link>https://r0tbyt3.dev/wiki/labs/hackthebox/ai-and-ml-exploitation/prometheon/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/ai-and-ml-exploitation/prometheon/</guid><description/></item><item><title/><link>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/el-mundo/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/el-mundo/</guid><description/></item><item><title/><link>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/el-pipo/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/el-pipo/</guid><description/></item><item><title/><link>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/el-teteo/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/el-teteo/</guid><description/></item><item><title/><link>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/hunting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/hunting/</guid><description/></item><item><title/><link>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/mathematricks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/mathematricks/</guid><description/></item><item><title/><link>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/questionnaire/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/questionnaire/</guid><description/></item><item><title/><link>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/r0bob1rd/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/r0bob1rd/</guid><description/></item><item><title/><link>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/racecar/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/racecar/</guid><description/></item><item><title/><link>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/restaurant/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/restaurant/</guid><description/></item><item><title/><link>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/rocket-blaster-xxx/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/binary-exploitation/rocket-blaster-xxx/</guid><description/></item><item><title>Abusing WMI for Persistence</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/abusing-wmi-for-persistence/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/abusing-wmi-for-persistence/</guid><description>Abusing WMI for Persistence Abusing WMI for Persistence - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Introduction to Windows Persistence Persistence via COM Object Hijacking Persistence via Electron Applications Persistence via File System Persistence via Startup Folder Persistence via Windows Registry Persistence via Windows Services Persistence via Windows Tasks</description></item><item><title>Access control lists (ACLs)</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/access-control-lists-acls/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/access-control-lists-acls/</guid><description>Access control lists (ACLs) Access Control Lists - lists defining which users or systems are granted access to specific resources.
Related Links: Attribute-based access control (ABAC) Capability-based access control OAuth OpenID Connect (OIDC) Role-based access control (RBAC)</description></item><item><title>Accessing Memory-Mapped Registers with Pointers</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/accessing-memory-mapped-registers-with-pointers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/accessing-memory-mapped-registers-with-pointers/</guid><description>Accessing Memory-Mapped Registers with Pointers Accessing Memory-Mapped Registers with Pointers - technique for directly reading and writing hardware registers by casting their addresses to typed pointer types in C.
Related Links: Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>ACID</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/acid/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/acid/</guid><description>ACID ACID - properties (Atomicity, Consistency, Isolation, Durability) that guarantee reliable database transactions.
Atomicity - a transaction is either completed or not at all. Consistency - a transaction must bring the database from one valid state to another. Isolation - concurrent transactions must not affect each other. Durability - once a transaction is committed, it must persist even in the event of a system failure.
Atomicity Example Scenario Scenario: A transaction to transfer $100 from account A to account B fails due to a system failure.</description></item><item><title>Acoustic Communication Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/acoustic-communication-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/acoustic-communication-exploits/</guid><description>Acoustic Communication Exploits Acoustic Communication Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Bluetooth Exploits Deauth Evil Twin Attacks Infrared Exploits Near-Field Communication (NFC) Exploits Power Line Communication Exploits Quantum Communication Exploits Radio Frequency Exploits Rogue Access Point Satellite Communication Exploits Ultrasonic Communication Exploits Visible Light Communication Exploits WiFi Exploits</description></item><item><title>Active Directory</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/</guid><description>Active Directory Active Directory - Microsoft&amp;rsquo;s directory service for managing users, computers, and policies in Windows domain environments.
Active Directory Fundamentals Group Administration IAM Policies Identity and Access Management Fundamentals Identity Federation Pass the Hash Privileged Access Management User Administration Related Links: Active Directory Enumeration Create Shortcut via IShellLink COM Interface File Creation File Operations Windows Administration Windows Exploitation Write File to Disk</description></item><item><title>Active Directory Enumeration</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/</guid><description>Active Directory Enumeration Active Directory Enumeration - techniques for querying Active Directory to gather information about users, groups, computers, and domain configuration.
Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration Related Links: Active Directory Create Shortcut via IShellLink COM Interface File Creation File Operations Windows Administration Windows Exploitation Write File to Disk</description></item><item><title>Active Directory Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/active-directory-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/active-directory-fundamentals/</guid><description>Active Directory Fundamentals Active Directory Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Group Administration IAM Policies Identity and Access Management Fundamentals Identity Federation Pass the Hash Privileged Access Management User Administration</description></item><item><title>Ad Blocker Detection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/ad-blocker-detection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/ad-blocker-detection/</guid><description>Ad Blocker Detection Ad Blocker Detection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>Add Binary Icon</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/add-binary-icon/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/add-binary-icon/</guid><description>Add Binary Icon Add Binary Icon - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Add User to Local Group</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/add-user-to-local-group/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/add-user-to-local-group/</guid><description>Add User to Local Group Add User to Local Group - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Advanced functions</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/language-fundamentals/advanced-functions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/language-fundamentals/advanced-functions/</guid><description>Advanced functions Advanced Functions - higher-order functions, decorators, generators, and closures in Python.
Higher-order Functions Higher-order functions - functions that can take other functions as arguments or return them as results.
Examples:
def apply_function(func, value): return func(value) def square(x): return x ** 2 result = apply_function(square, 5) # calls square(5) inside apply_function print(result) # Output: 25 Decorators Decorators - functions that modify the behavior of other functions or methods.
Examples:</description></item><item><title>Advanced SQL</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/advanced-sql/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/advanced-sql/</guid><description>Advanced SQL Advanced SQL - complex SQL techniques including window functions, CTEs, and query optimization.
Related Links: Aggregate queries Common table expressions (CTEs) Dynamic SQL Join queries Pivot and unpivot operations Recursive queries Select, insert, delete, update statements Stored procedures and triggers Subqueries Views Window functions</description></item><item><title>Adversary in the Middle (AitM) via Evilginx</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/adversary-in-the-middle-aitm-via-evilginx/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/adversary-in-the-middle-aitm-via-evilginx/</guid><description>Adversary in the Middle (AitM) via Evilginx Adversary in the Middle (AitM) via Evilginx - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx Phishlet Development Evilginx URL Rewriting GitHub Device Code Phishing GitLab Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Microsoft Device Code Phishing Protecting Evilginx Server via Caddy</description></item><item><title>AES</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/aes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/aes/</guid><description>AES AES - Advanced Encryption Standard implementations across various libraries and APIs for use in security tooling.
AES Decryption Encryption via CTAES Library AES Decryption Encryption via Tiny AES Library AES Decryption Encryption via WinAPIs AES Encryption Decryption Related Links: Base N Encoder Entropy Reduction Brute Forcing Key Decryption Caesar Cipher Encryption Decryption ChaCha20 Encryption Algorithm Data Encryption Techniques Encryption Fundamentals Generating Encryption Keys Without WinAPI Calls Random Key Generation RC4 SystemFunction040 Encryption Decryption XOR Encryption Decryption via Multi-Byte Key XOR Encryption Decryption via Single Byte</description></item><item><title>AES Decryption Encryption via CTAES Library</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/aes/aes-decryption-encryption-via-ctaes-library/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/aes/aes-decryption-encryption-via-ctaes-library/</guid><description>AES Decryption Encryption via CTAES Library AES Decryption Encryption via CTAES Library - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Decryption Encryption via Tiny AES Library AES Decryption Encryption via WinAPIs AES Encryption Decryption</description></item><item><title>AES Decryption Encryption via Tiny AES Library</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/aes/aes-decryption-encryption-via-tiny-aes-library/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/aes/aes-decryption-encryption-via-tiny-aes-library/</guid><description>AES Decryption Encryption via Tiny AES Library AES Decryption Encryption via Tiny AES Library - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Decryption Encryption via CTAES Library AES Decryption Encryption via WinAPIs AES Encryption Decryption</description></item><item><title>AES Decryption Encryption via WinAPIs</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/aes/aes-decryption-encryption-via-winapis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/aes/aes-decryption-encryption-via-winapis/</guid><description>AES Decryption Encryption via WinAPIs AES Decryption Encryption via WinAPIs - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Decryption Encryption via CTAES Library AES Decryption Encryption via Tiny AES Library AES Encryption Decryption</description></item><item><title>AES Encryption Decryption</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/aes/aes-encryption-decryption/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/aes/aes-encryption-decryption/</guid><description>AES Encryption Decryption AES Encryption Decryption - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Decryption Encryption via CTAES Library AES Decryption Encryption via Tiny AES Library AES Decryption Encryption via WinAPIs</description></item><item><title>Aggregate queries</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/aggregate-queries/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/aggregate-queries/</guid><description>Aggregate queries Aggregate Queries - SQL queries using functions like COUNT, SUM, and AVG to summarize data.
Related Links: Advanced SQL Common table expressions (CTEs) Dynamic SQL Join queries Pivot and unpivot operations Recursive queries Select, insert, delete, update statements Stored procedures and triggers Subqueries Views Window functions</description></item><item><title>Agile and Scrum</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devops-fundamentals/agile-and-scrum/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devops-fundamentals/agile-and-scrum/</guid><description>Agile and Scrum Agile and Scrum - iterative software development methodology using sprints, standups, and retrospectives for continuous delivery.
Related Links: DevOps and DevSecOps Fundamentals Phases of DevOps Software Delivery Models Waterfall vs Agile vs DevOps</description></item><item><title>AI and LLMs</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/ai-and-llms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/ai-and-llms/</guid><description>AI and LLMs AI and LLMs - integrating AI models and large language model capabilities into Python backend applications.
Ai in development Embeddings Function calling RAGs Structured outputs Related Links: Language Fundamentals Software Engineering</description></item><item><title>Ai in development</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/ai-and-llms/ai-in-development/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/ai-and-llms/ai-in-development/</guid><description>Ai in development AI in Development - using AI tools and LLMs to enhance developer workflows and productivity.
Related Links: Embeddings Function calling RAGs Structured outputs</description></item><item><title>AI-Generated Malware</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/ai-generated-malware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/ai-generated-malware/</guid><description>AI-Generated Malware AI-Generated Malware - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>AitM and MFA Bypass</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/</guid><description>AitM and MFA Bypass AitM and MFA Bypass - adversary-in-the-middle proxy techniques and OAuth device code flows used to bypass multi-factor authentication.
Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx Phishlet Development Evilginx URL Rewriting GitHub Device Code Phishing GitLab Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Microsoft Device Code Phishing Protecting Evilginx Server via Caddy Related Links: Anti-Bot Email Attachments and Phishing Campaigns HTML Smuggling Infrastructure Introduction to Phishing Page Design and Delivery Phishing Anti-Analysis Phishing Requirements</description></item><item><title>Alertable Functions</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/alertable-functions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/alertable-functions/</guid><description>Alertable Functions Alertable Functions - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Algorithms</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/</guid><description>Algorithms Algorithms - core algorithmic techniques and their Python 3 implementations for technical interview preparation.
Backtracking Big O Notation Bit Manipulation Divide and Conquer Dynamic Programming Graph Algorithms Greedy Algorithms Recursion Searching Sorting Related Links: Data Structures Patterns</description></item><item><title>AlwaysInstallElevated Privilege Escalation Check</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/alwaysinstallelevated-privilege-escalation-check/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/alwaysinstallelevated-privilege-escalation-check/</guid><description>AlwaysInstallElevated Privilege Escalation Check AlwaysInstallElevated Privilege Escalation Check - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item><item><title>AMSI Bypass</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/amsi-bypass/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/amsi-bypass/</guid><description>AMSI Bypass AMSI Bypass - techniques for disabling or circumventing the Antimalware Scan Interface to prevent PowerShell and script content from being scanned.
AMSI Bypass Byte Patching AMSI Evasion AMSI Evasion via Hardware Breakpoint Hooks AMSI Evasion via Patching Introduction to AMSI Patchless AMSI Bypass via Hardware Breakpoints Related Links: Anti-Analysis Automated Obfuscation Techniques Code Obfuscation Covering Tracks ETW Bypass NTDLL Unhooking and API Hooking</description></item><item><title>AMSI Bypass Byte Patching</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/amsi-bypass/amsi-bypass-byte-patching/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/amsi-bypass/amsi-bypass-byte-patching/</guid><description>AMSI Bypass Byte Patching AMSI Bypass Byte Patching - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AMSI Evasion AMSI Evasion via Hardware Breakpoint Hooks AMSI Evasion via Patching Introduction to AMSI Patchless AMSI Bypass via Hardware Breakpoints</description></item><item><title>AMSI Evasion</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/amsi-bypass/amsi-evasion/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/amsi-bypass/amsi-evasion/</guid><description>AMSI Evasion AMSI Evasion - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AMSI Bypass Byte Patching AMSI Evasion via Hardware Breakpoint Hooks AMSI Evasion via Patching Introduction to AMSI Patchless AMSI Bypass via Hardware Breakpoints</description></item><item><title>AMSI Evasion via Hardware Breakpoint Hooks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/amsi-bypass/amsi-evasion-via-hardware-breakpoint-hooks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/amsi-bypass/amsi-evasion-via-hardware-breakpoint-hooks/</guid><description>AMSI Evasion via Hardware Breakpoint Hooks AMSI Evasion via Hardware Breakpoint Hooks - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AMSI Bypass Byte Patching AMSI Evasion AMSI Evasion via Patching Introduction to AMSI Patchless AMSI Bypass via Hardware Breakpoints</description></item><item><title>AMSI Evasion via Patching</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/amsi-bypass/amsi-evasion-via-patching/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/amsi-bypass/amsi-evasion-via-patching/</guid><description>AMSI Evasion via Patching AMSI Evasion via Patching - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AMSI Bypass Byte Patching AMSI Evasion AMSI Evasion via Hardware Breakpoint Hooks Introduction to AMSI Patchless AMSI Bypass via Hardware Breakpoints</description></item><item><title>Analysis Methods</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/analysis-methods/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/analysis-methods/</guid><description>Analysis Methods Analysis Methods - techniques and methodologies for examining malware through static inspection and dynamic execution.
Dynamic Analysis Malware Analysis Techniques Static Analysis Related Links: Automated Malware Analysis Maltego Memory Leaks Metasploit Reverse Engineering Urlvoid Virustotal</description></item><item><title>Analyzing and Evading SmuggleShield</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/analyzing-and-evading-smuggleshield/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/analyzing-and-evading-smuggleshield/</guid><description>Analyzing and Evading SmuggleShield Analyzing and Evading SmuggleShield - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: HTML Smuggling HTML Smuggling Strategies Integrating Anti-Bot with HTML Smuggling MOTW Bypass via FileFix Variations SVG Smuggling WebAssembly Smuggling</description></item><item><title>Analyzing Server Security</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/analyzing-server-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/analyzing-server-security/</guid><description>Analyzing Server Security Analyzing Server Security - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anonymous SMB Login</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/anonymous-smb-login/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/anonymous-smb-login/</guid><description>Anonymous SMB Login Anonymous SMB Login - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Anti-Analysis</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/</guid><description>Anti-Analysis Anti-Analysis - techniques that detect and subvert debugging, virtual machine, and sandbox environments to prevent dynamic malware analysis.
Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques Related Links: AMSI Bypass Automated Obfuscation Techniques Code Obfuscation Covering Tracks ETW Bypass NTDLL Unhooking and API Hooking</description></item><item><title>Anti-Analysis Approve Access via Discord</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-approve-access-via-discord/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-approve-access-via-discord/</guid><description>Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Discord - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis Approve Access via Email</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-approve-access-via-email/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-approve-access-via-email/</guid><description>Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Email - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis Approve Access via Push Notifications</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-approve-access-via-push-notifications/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-approve-access-via-push-notifications/</guid><description>Anti-Analysis Approve Access via Push Notifications Anti-Analysis Approve Access via Push Notifications - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis Dynamic Obfuscation via Obfuscatorio</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-dynamic-obfuscation-via-obfuscatorio/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-dynamic-obfuscation-via-obfuscatorio/</guid><description>Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis Dynamic Obfuscation via Obfuscatorio - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis via AES Encryption</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-aes-encryption/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-aes-encryption/</guid><description>Anti-Analysis via AES Encryption Anti-Analysis via AES Encryption - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis via Base64 Obfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-base64-obfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-base64-obfuscation/</guid><description>Anti-Analysis via Base64 Obfuscation Anti-Analysis via Base64 Obfuscation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis via Cookie Check</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-cookie-check/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-cookie-check/</guid><description>Anti-Analysis via Cookie Check Anti-Analysis via Cookie Check - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis via Dynamic Encryption</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-dynamic-encryption/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-dynamic-encryption/</guid><description>Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic Encryption - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis via Dynamic HTML Generation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-dynamic-html-generation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-dynamic-html-generation/</guid><description>Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Dynamic HTML Generation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis via Fetching Remote Content</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-fetching-remote-content/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-fetching-remote-content/</guid><description>Anti-Analysis via Fetching Remote Content Anti-Analysis via Fetching Remote Content - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis via Honeypots</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-honeypots/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-honeypots/</guid><description>Anti-Analysis via Honeypots Anti-Analysis via Honeypots - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis via Invisible Encoding</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-invisible-encoding/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-invisible-encoding/</guid><description>Anti-Analysis via Invisible Encoding Anti-Analysis via Invisible Encoding - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis via IP Restrictions</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-ip-restrictions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-ip-restrictions/</guid><description>Anti-Analysis via IP Restrictions Anti-Analysis via IP Restrictions - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis via Reverse DNS Query</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-reverse-dns-query/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-reverse-dns-query/</guid><description>Anti-Analysis via Reverse DNS Query Anti-Analysis via Reverse DNS Query - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis via Website Keying</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-website-keying/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-website-keying/</guid><description>Anti-Analysis via Website Keying Anti-Analysis via Website Keying - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Analysis via XOR Obfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-xor-obfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/anti-analysis-via-xor-obfuscation/</guid><description>Anti-Analysis via XOR Obfuscation Anti-Analysis via XOR Obfuscation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Anti-Bot</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/</guid><description>Anti-Bot Anti-Bot - techniques for detecting and blocking automated scanners, security bots, and analysis tools from accessing phishing pages.
Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting Related Links: AitM and MFA Bypass Email Attachments and Phishing Campaigns HTML Smuggling Infrastructure Introduction to Phishing Page Design and Delivery Phishing Anti-Analysis Phishing Requirements</description></item><item><title>Anti-Bot Library</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/anti-bot-library/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/anti-bot-library/</guid><description>Anti-Bot Library Anti-Bot Library - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>Anti-Bot via Advanced JA4 Analysis</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/anti-bot-via-advanced-ja4-analysis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/anti-bot-via-advanced-ja4-analysis/</guid><description>Anti-Bot via Advanced JA4 Analysis Anti-Bot via Advanced JA4 Analysis - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>Anti-Bot via CAPTCHA</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/anti-bot-via-captcha/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/anti-bot-via-captcha/</guid><description>Anti-Bot via CAPTCHA Anti-Bot via CAPTCHA - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>Anti-Bot via Improper Window Size</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/anti-bot-via-improper-window-size/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/anti-bot-via-improper-window-size/</guid><description>Anti-Bot via Improper Window Size Anti-Bot via Improper Window Size - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>Anti-Bot via User Agent Filtering</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/anti-bot-via-user-agent-filtering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/anti-bot-via-user-agent-filtering/</guid><description>Anti-Bot via User Agent Filtering Anti-Bot via User Agent Filtering - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>Anti-Bot via User Agent Spoofing Detection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/anti-bot-via-user-agent-spoofing-detection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/anti-bot-via-user-agent-spoofing-detection/</guid><description>Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Agent Spoofing Detection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>Anti-Bot via User Interaction</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/anti-bot-via-user-interaction/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/anti-bot-via-user-interaction/</guid><description>Anti-Bot via User Interaction Anti-Bot via User Interaction - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>Anti-Debugging Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-debugging-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-debugging-techniques/</guid><description>Anti-Debugging Techniques Anti-Debugging Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Anti-Debugging via NtGlobalFlag</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-debugging-via-ntglobalflag/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-debugging-via-ntglobalflag/</guid><description>Anti-Debugging via NtGlobalFlag Anti-Debugging via NtGlobalFlag - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Anti-Debugging via NtSystemDebugControl</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-debugging-via-ntsystemdebugcontrol/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-debugging-via-ntsystemdebugcontrol/</guid><description>Anti-Debugging via NtSystemDebugControl Anti-Debugging via NtSystemDebugControl - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Anti-Debugging via ProcessDebugFlags</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-debugging-via-processdebugflags/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-debugging-via-processdebugflags/</guid><description>Anti-Debugging via ProcessDebugFlags Anti-Debugging via ProcessDebugFlags - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Anti-Debugging via Ptrace</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-debugging-via-ptrace/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-debugging-via-ptrace/</guid><description>Anti-Debugging via Ptrace Anti-Debugging via Ptrace - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Anti-Debugging via TLS Callbacks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-debugging-via-tls-callbacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-debugging-via-tls-callbacks/</guid><description>Anti-Debugging via TLS Callbacks Anti-Debugging via TLS Callbacks - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Anti-Forensic Evasion Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-forensic-evasion-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-forensic-evasion-techniques/</guid><description>Anti-Forensic Evasion Techniques Anti-Forensic Evasion Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Anti-Forensic Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/anti-forensic-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/anti-forensic-techniques/</guid><description>Anti-Forensic Techniques Anti-Forensic Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automated Reverse Engineering Digital Forensics Forensics Hayabusa Incident Response Threat Hunting Techniques</description></item><item><title>Anti-Forensic Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/anti-forensic-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/anti-forensic-techniques/</guid><description>Anti-Forensic Techniques Anti-Forensic Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Covering Tracks Techniques Data Destruction Techniques File Time Stomping Log Tampering Techniques Self-Deletion Techniques Shadow Copy Deletion Timestomping Techniques</description></item><item><title>Anti-Malware Evasion Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-malware-evasion-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-malware-evasion-techniques/</guid><description>Anti-Malware Evasion Techniques Anti-Malware Evasion Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Anti-Virtualization Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-virtualization-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-virtualization-techniques/</guid><description>Anti-Virtualization Techniques Anti-Virtualization Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Anti-Virus Evasion Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-virus-evasion-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/anti-virus-evasion-techniques/</guid><description>Anti-Virus Evasion Techniques Anti-Virus Evasion Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>AP String Hashing Algorithm</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/ap-string-hashing-algorithm/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/ap-string-hashing-algorithm/</guid><description>AP String Hashing Algorithm AP String Hashing Algorithm - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>AP String Hashing Algorithm ASCII</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/ap-string-hashing-algorithm-ascii/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/ap-string-hashing-algorithm-ascii/</guid><description>AP String Hashing Algorithm ASCII AP String Hashing Algorithm ASCII - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>AP String Hashing Syscalls Hash Values NT</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/ap-string-hashing-syscalls-hash-values-nt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/ap-string-hashing-syscalls-hash-values-nt/</guid><description>AP String Hashing Syscalls Hash Values NT AP String Hashing Syscalls Hash Values NT - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>AP Syscalls Hash Values ZW</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/ap-syscalls-hash-values-zw/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/ap-syscalls-hash-values-zw/</guid><description>AP Syscalls Hash Values ZW AP Syscalls Hash Values ZW - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>AP WinAPIs Hash Values</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/ap-winapis-hash-values/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/ap-winapis-hash-values/</guid><description>AP WinAPIs Hash Values AP WinAPIs Hash Values - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Apache</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/apache/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/apache/</guid><description>Apache Apache - open-source HTTP server software widely used for serving web content.
Related Links: Caddy Domain name Domain name system Http caching Https Nginx Fundamentals Web servers</description></item><item><title>APC Injection via Write to Process Memory</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/apc-injection-via-write-to-process-memory/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/apc-injection-via-write-to-process-memory/</guid><description>APC Injection via Write to Process Memory APC Injection via Write to Process Memory - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>APC Queues</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/apc-queues/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/apc-queues/</guid><description>APC Queues APC Queues - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>API</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/api/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/api/</guid><description>API API - the set of rules and protocols defining how software components communicate with each other.
Related Links: API Design API styles GraphQL GraphQL Fundamentals GRPC HTTP and API Fundamentals Open API Specification (OAS) REST REST API Design SOAP</description></item><item><title>API Design</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/api-design/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/api-design/</guid><description>API Design API Design - principles and patterns for designing clear, consistent, and usable application interfaces.
Related Links: API API styles GraphQL GraphQL Fundamentals GRPC HTTP and API Fundamentals Open API Specification (OAS) REST REST API Design SOAP</description></item><item><title>API Hooking</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/api-hooking/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/api-hooking/</guid><description>API Hooking API Hooking - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>API Hooking Variants</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/api-hooking-variants/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/api-hooking-variants/</guid><description>API Hooking Variants API Hooking Variants - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Hardware Hooks NTDLL Unhooking NTDLL Unhooking Variants Unhooking All DLLs Utilizing Hardware Breakpoints for Hooking 1 Utilizing Hardware Breakpoints for Hooking 2</description></item><item><title>API Security</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/api-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/api-security/</guid><description>API Security API Security - securing APIs in CI/CD pipelines through authentication, rate limiting, input validation, and automated scanning.
Related Links: Arachni Dynamic application security testing (DAST) Nikto Pipeline Security Shift Left Security Software composition analysis (SCA) Static application security testing (SAST) W3af</description></item><item><title>API security best practices</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/api-security-best-practices/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/api-security-best-practices/</guid><description>API security best practices API Security Best Practices - techniques for securing APIs against common vulnerabilities and attacks.
Related Links: Container security best practices CORS CSP Mitigation techniques OWASP risks Server security</description></item><item><title>API Set Resolution</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/api-set-resolution/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/api-set-resolution/</guid><description>API Set Resolution API Set Resolution - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>API styles</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/api-styles/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/api-styles/</guid><description>API styles API Styles - comparison of REST, RPC, GraphQL, and other API architectural styles.
Related Links: API API Design GraphQL GraphQL Fundamentals GRPC HTTP and API Fundamentals Open API Specification (OAS) REST REST API Design SOAP</description></item><item><title>APIs</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/</guid><description>APIs APIs - protocols, styles, and standards for designing and consuming application programming interfaces.
API API Design API styles GraphQL GraphQL Fundamentals GRPC HTTP and API Fundamentals Open API Specification (OAS) REST REST API Design SOAP Related Links: Web Infrastructure</description></item><item><title>Application Security</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/</guid><description>Application Security Application Security - the practice of identifying and mitigating vulnerabilities in software applications throughout the development lifecycle.
Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks Related Links: Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>APT</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/threat-modeling/apt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/threat-modeling/apt/</guid><description>APT APT - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: OSINT Reconnaissance Techniques Supply Chain Attacks Threat Modeling Fundamentals Zero Day</description></item><item><title>Arachni</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/arachni/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/arachni/</guid><description>Arachni Arachni - open-source web application security scanner used for automated vulnerability discovery.
Related Links: API Security Dynamic application security testing (DAST) Nikto Pipeline Security Shift Left Security Software composition analysis (SCA) Static application security testing (SAST) W3af</description></item><item><title>Architectural patterns</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/architectural-patterns/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/architectural-patterns/</guid><description>Architectural patterns Architectural Patterns - reusable solutions to common software architecture problems at a system level.
Related Links: Backend Architecture Microservices Monolith Monolith vs Microservices Serverless Serverless computing Service mesh architecture Service meshes Service-oriented architecture (SOA) Twelve-factor app</description></item><item><title>Architecture Patterns</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/</guid><description>Architecture Patterns Architecture Patterns - high-level structural patterns for organizing backend systems including monoliths, microservices, and serverless.
Architectural patterns Backend Architecture Microservices Monolith Monolith vs Microservices Serverless Serverless computing Service mesh architecture Service meshes Service-oriented architecture (SOA) Twelve-factor app Related Links: Scalability and Infrastructure</description></item><item><title>Argon2</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/argon2/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/argon2/</guid><description>Argon2 Argon2 - memory-hard password hashing algorithm designed to resist GPU and brute-force attacks.
Related Links: Bcrypt Hashing algorithms MD5 Scrypt SHA-1 SHA-256 TLS</description></item><item><title>Arm M-profile</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/</guid><description>Arm M-profile Arm M-profile - the family of Arm processor cores designed for embedded and microcontroller applications, including the Cortex-M series with its NVIC, MPU, and TrustZone-M security extensions.
Boot Flow on Cortex-M Exceptions Interruptions MPU Usage Patterns NVIC TrustZone-M Related Links: Bus Fabrics and On-Chip Interconnects CPU Core Concepts Heterogeneous SoCs and Co-processors Memory Architecture Power and Clock Domain Architecture RISC-V Single Core vs Multi-Core Architectures</description></item><item><title>Arrays</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/arrays/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/arrays/</guid><description>Arrays Arrays - ordered, index-based collections stored contiguously in memory with O(1) random access and O(n) insertion.
Related Links: Binary Search Trees Graphs Hash Tables Heaps Linked Lists Queues Sets Stacks Strings Trees Tries</description></item><item><title>Assembly</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/assembly/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/assembly/</guid><description>Assembly Assembly - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Attribute-based access control (ABAC)</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/attribute-based-access-control-abac/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/attribute-based-access-control-abac/</guid><description>Attribute-based access control (ABAC) Attribute-Based Access Control - authorization model granting access based on user attributes and policies.
Related Links: Access control lists (ACLs) Capability-based access control OAuth OpenID Connect (OIDC) Role-based access control (RBAC)</description></item><item><title>Authentication</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/</guid><description>Authentication Authentication - mechanisms for verifying identity including passwords, tokens, sessions, and multi-factor methods.
Authentication and Authorization AuthN vs AuthZ Multi-factor authentication (MFA) Password-based authentication Session and Token Security Token-based authentication Related Links: Authorization Cryptography Web Security</description></item><item><title>Authentication and Authorization</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/authentication-and-authorization/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/authentication-and-authorization/</guid><description>Authentication and Authorization Authentication and Authorization - mechanisms for verifying identity and controlling access to resources.
Related Links: AuthN vs AuthZ Multi-factor authentication (MFA) Password-based authentication Session and Token Security Token-based authentication</description></item><item><title>Authentication and Authorization</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/</guid><description>Authentication and Authorization Authentication and Authorization - attack techniques targeting weak authentication mechanisms and improper access control implementations.
Authentication Bypass Techniques Breaking Authentication Breaking Authorization Brute Force vs Password Spraying Related Links: Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks</description></item><item><title>Authentication Bypass Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/authentication-bypass-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/authentication-bypass-techniques/</guid><description>Authentication Bypass Techniques Authentication Bypass Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Breaking Authentication Breaking Authorization Brute Force vs Password Spraying</description></item><item><title>AuthN vs AuthZ</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/authn-vs-authz/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/authn-vs-authz/</guid><description>AuthN vs AuthZ AuthN vs AuthZ - distinction between authentication (who you are) and authorization (what you can do).
Related Links: Authentication and Authorization Multi-factor authentication (MFA) Password-based authentication Session and Token Security Token-based authentication</description></item><item><title>Authorization</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/</guid><description>Authorization Authorization - mechanisms for controlling access to resources based on verified identity and assigned permissions.
Access control lists (ACLs) Attribute-based access control (ABAC) Capability-based access control OAuth OpenID Connect (OIDC) Role-based access control (RBAC) Related Links: Authentication Cryptography Web Security</description></item><item><title>Automate Phishing Infrastructure Ansible</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/automate-phishing-infrastructure-ansible/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/automate-phishing-infrastructure-ansible/</guid><description>Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Ansible - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Automate Phishing Infrastructure Terraform</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/automate-phishing-infrastructure-terraform/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/automate-phishing-infrastructure-terraform/</guid><description>Automate Phishing Infrastructure Terraform Automate Phishing Infrastructure Terraform - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Automated Botnet Development</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/automated-botnet-development/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/automated-botnet-development/</guid><description>Automated Botnet Development Automated Botnet Development - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Automated C2 Infrastructure Setup</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/automated-c2-infrastructure-setup/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/automated-c2-infrastructure-setup/</guid><description>Automated C2 Infrastructure Setup Automated C2 Infrastructure Setup - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Automated Cryptojacking Malware Development</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/automated-cryptojacking-malware-development/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/automated-cryptojacking-malware-development/</guid><description>Automated Cryptojacking Malware Development Automated Cryptojacking Malware Development - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Automated Evasion Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/automated-evasion-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/automated-evasion-techniques/</guid><description>Automated Evasion Techniques Automated Evasion Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Automated Exploit Generation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/automated-exploit-generation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/automated-exploit-generation/</guid><description>Automated Exploit Generation Automated Exploit Generation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication and Authorization Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks</description></item><item><title>Automated Fileless Malware Development</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/automated-fileless-malware-development/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/automated-fileless-malware-development/</guid><description>Automated Fileless Malware Development Automated Fileless Malware Development - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Automated Malware Analysis</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/automated-malware-analysis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/automated-malware-analysis/</guid><description>Automated Malware Analysis Automated Malware Analysis - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analysis Methods Maltego Memory Leaks Metasploit Reverse Engineering Urlvoid Virustotal</description></item><item><title>Automated Malware Delivery Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/automated-malware-delivery-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/automated-malware-delivery-techniques/</guid><description>Automated Malware Delivery Techniques Automated Malware Delivery Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Automated Malware Distribution Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/automated-malware-distribution-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/automated-malware-distribution-techniques/</guid><description>Automated Malware Distribution Techniques Automated Malware Distribution Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Automated Obfuscation Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/automated-obfuscation-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/automated-obfuscation-techniques/</guid><description>Automated Obfuscation Techniques Automated Obfuscation Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AMSI Bypass Anti-Analysis Code Obfuscation Covering Tracks ETW Bypass NTDLL Unhooking and API Hooking</description></item><item><title>Automated Payload Generation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/automated-payload-generation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/automated-payload-generation/</guid><description>Automated Payload Generation Automated Payload Generation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Automated Payload Generation Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/automated-payload-generation-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/automated-payload-generation-techniques/</guid><description>Automated Payload Generation Techniques Automated Payload Generation Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Automated Polymorphic and Metamorphic Malware Development</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/automated-polymorphic-and-metamorphic-malware-development/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/automated-polymorphic-and-metamorphic-malware-development/</guid><description>Automated Polymorphic and Metamorphic Malware Development Automated Polymorphic and Metamorphic Malware Development - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Automated Reverse Engineering</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/automated-reverse-engineering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/automated-reverse-engineering/</guid><description>Automated Reverse Engineering Automated Reverse Engineering - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Forensic Techniques Digital Forensics Forensics Hayabusa Incident Response Threat Hunting Techniques</description></item><item><title>Automated Social Engineering Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/automated-social-engineering-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/automated-social-engineering-techniques/</guid><description>Automated Social Engineering Techniques Automated Social Engineering Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automated Spear Phishing Email Generation Digital Social Engineering Physical Social Engineering Social Engineering Fundamentals Social Engineering Techniques</description></item><item><title>Automated Spear Phishing Email Generation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/automated-spear-phishing-email-generation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/automated-spear-phishing-email-generation/</guid><description>Automated Spear Phishing Email Generation Automated Spear Phishing Email Generation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automated Social Engineering Techniques Digital Social Engineering Physical Social Engineering Social Engineering Fundamentals Social Engineering Techniques</description></item><item><title>Automated Vulnerability Discovery</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/automated-vulnerability-discovery/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/automated-vulnerability-discovery/</guid><description>Automated Vulnerability Discovery Automated Vulnerability Discovery - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication and Authorization Automated Exploit Generation Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks</description></item><item><title>AV Detection Mechanisms</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/av-detection-mechanisms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/av-detection-mechanisms/</guid><description>AV Detection Mechanisms AV Detection Mechanisms - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Avoid Detection Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/avoid-detection-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/avoid-detection-techniques/</guid><description>Avoid Detection Techniques Avoid Detection Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Backend Architecture</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/backend-architecture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/backend-architecture/</guid><description>Backend Architecture Backend Architecture - overall structure and organization of server-side systems and their components.
Related Links: Architectural patterns Microservices Monolith Monolith vs Microservices Serverless Serverless computing Service mesh architecture Service meshes Service-oriented architecture (SOA) Twelve-factor app</description></item><item><title>Backend Engineering</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/</guid><description>Backend Engineering Backend Engineering - design, development, and maintenance of server-side applications, APIs, databases, and infrastructure that power web applications and services.
Concurrency Databases Django DSA Python Security System Design Web Related Links: Cybersecurity DevOps and Platform Engineering Embedded Systems Home</description></item><item><title>Backpressure</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/backpressure/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/backpressure/</guid><description>Backpressure Backpressure - mechanism in streaming systems to signal producers to slow down when consumers are overwhelmed.
Related Links: Circuit breakers Event-driven architecture Failure modes Graceful degradation Loadshifting Rate limiting Real time data Realtime Server sent events short polling Streaming Throttling Websockets</description></item><item><title>Backtracking</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/backtracking/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/backtracking/</guid><description>Backtracking Backtracking - algorithmic technique building candidates incrementally and abandoning paths that violate constraints.
Related Links: Big O Notation Bit Manipulation Divide and Conquer Dynamic Programming Graph Algorithms Greedy Algorithms Recursion Searching Sorting</description></item><item><title>Base N Encoder Entropy Reduction</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/base-n-encoder-entropy-reduction/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/base-n-encoder-entropy-reduction/</guid><description>Base N Encoder Entropy Reduction Base N Encoder Entropy Reduction - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Brute Forcing Key Decryption Caesar Cipher Encryption Decryption ChaCha20 Encryption Algorithm Data Encryption Techniques Encryption Fundamentals Generating Encryption Keys Without WinAPI Calls Random Key Generation RC4 SystemFunction040 Encryption Decryption XOR Encryption Decryption via Multi-Byte Key XOR Encryption Decryption via Single Byte</description></item><item><title>Bash</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/bash/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/bash/</guid><description>Bash Bash - the Bourne Again Shell scripting language used extensively in Linux-based cybersecurity tooling, automation, and offensive operations.
Bash Fundamentals Related Links: Application Security Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Bash Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/bash/bash-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/bash/bash-fundamentals/</guid><description>Bash Fundamentals Bash Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links:</description></item><item><title>Basic data types</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/language-fundamentals/basic-data-types/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/language-fundamentals/basic-data-types/</guid><description>Basic data types Basic Data Types - fundamental Python data types and their usage in programs.
Integers Integers - used for representing whole numbers without a fractional part.
Examples:
Floats Floats - used for representing decimal numbers.
Examples:
Strings Examples:
Lists Examples:
Dictionaries Examples:
Tuples Examples:
Sets Examples:
Booleans Booleans - used for representing truth values (True/False aka 1/0) during conditional operations.
Examples:
x = True y = False Note: True/False can be substitued with values 1/0 respectively due to how Python handles boolean values</description></item><item><title>Basic keywords</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/language-fundamentals/basic-keywords/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/language-fundamentals/basic-keywords/</guid><description>Basic keywords Basic Keywords - reserved words in Python and their usage in programs.
Related Links: Advanced functions Basic operators Basic data types</description></item><item><title>Basic operators</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/language-fundamentals/basic-operators/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/language-fundamentals/basic-operators/</guid><description>Basic operators Basic Operators - arithmetic, comparison, logical, and assignment operators in Python.
Arithemtic Operators Arithmeatic Operators - used for performing mathematical operations on numbers.
Examples:
1 + 2 # Addition 3 - 4 # Subtraction 5 * 6 # Multiplication 7 / 8 # Division 9 % 2 # Modulus 10 ** 3 # Exponentiation 11 // 4 # Floor Division Operator Precedence Operator precedence - the order in which operations are evaluated in an expression.</description></item><item><title>Bcrypt</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/bcrypt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/bcrypt/</guid><description>Bcrypt Bcrypt - adaptive password hashing function designed to be computationally expensive to resist cracking.
Related Links: Argon2 Hashing algorithms MD5 Scrypt SHA-1 SHA-256 TLS</description></item><item><title>Beacon Object Files (BOF)</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/beacon-object-files-bof/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/beacon-object-files-bof/</guid><description>Beacon Object Files (BOF) Beacon Object Files (BOF) - position-independent code objects executed in-process by C2 frameworks such as Cobalt Strike for post-exploitation.
BOF Execution Introduction to BOF LSASS Dump BOF Object File Loader with Module Stomping Threadless Shellcode Injection via HWBPs BOF Writing BOF Files Related Links: C2 and Networking Credential Dumping Malware Concepts Payload and PE Persistence Process Injection Sleep Obfuscation Windows Internals</description></item><item><title>BFS Pattern</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/bfs-pattern/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/bfs-pattern/</guid><description>BFS Pattern BFS Pattern - breadth-first search template for shortest path, level-order traversal, and multi-source problems.
Related Links: Binary Search Pattern DFS Pattern Fast and Slow Pointers Merge Intervals Monotonic Stack Sliding Window Top K Elements Two Pointers Union Find</description></item><item><title>Big O Notation</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/big-o-notation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/big-o-notation/</guid><description>Big O Notation Big O Notation - mathematical notation expressing time and space complexity as a function of input size n.
Related Links: Backtracking Bit Manipulation Divide and Conquer Dynamic Programming Graph Algorithms Greedy Algorithms Recursion Searching Sorting</description></item><item><title>Binary Metadata Modification</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/binary-metadata-modification/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/binary-metadata-modification/</guid><description>Binary Metadata Modification Binary Metadata Modification - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Binary Properties Icon Metadata</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/binary-properties-icon-metadata/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/binary-properties-icon-metadata/</guid><description>Binary Properties Icon Metadata Binary Properties Icon Metadata - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Binary Search Pattern</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/binary-search-pattern/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/binary-search-pattern/</guid><description>Binary Search Pattern Binary Search Pattern - applying binary search to sorted arrays or to answer questions about monotonic functions.
Related Links: BFS Pattern DFS Pattern Fast and Slow Pointers Merge Intervals Monotonic Stack Sliding Window Top K Elements Two Pointers Union Find</description></item><item><title>Binary Search Trees</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/binary-search-trees/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/binary-search-trees/</guid><description>Binary Search Trees Binary Search Trees - sorted binary trees supporting O(log n) average search, insert, and delete.
Related Links: Arrays Graphs Hash Tables Heaps Linked Lists Queues Sets Stacks Strings Trees Tries</description></item><item><title>Bind to ATSVC via Named Pipe</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-atsvc-via-named-pipe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-atsvc-via-named-pipe/</guid><description>Bind to ATSVC via Named Pipe Bind to ATSVC via Named Pipe - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Bind to BKRP via Named Pipe</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-bkrp-via-named-pipe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-bkrp-via-named-pipe/</guid><description>Bind to BKRP via Named Pipe Bind to BKRP via Named Pipe - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Bind to EPM via Named Pipe</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-epm-via-named-pipe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-epm-via-named-pipe/</guid><description>Bind to EPM via Named Pipe Bind to EPM via Named Pipe - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Bind to LSAD via Named Pipe</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-lsad-via-named-pipe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-lsad-via-named-pipe/</guid><description>Bind to LSAD via Named Pipe Bind to LSAD via Named Pipe - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Bind to LSAT via Named Pipe</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-lsat-via-named-pipe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-lsat-via-named-pipe/</guid><description>Bind to LSAT via Named Pipe Bind to LSAT via Named Pipe - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Bind to NRPC via Named Pipe</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-nrpc-via-named-pipe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-nrpc-via-named-pipe/</guid><description>Bind to NRPC via Named Pipe Bind to NRPC via Named Pipe - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Bind to RPRN via Named Pipe</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-rprn-via-named-pipe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-rprn-via-named-pipe/</guid><description>Bind to RPRN via Named Pipe Bind to RPRN via Named Pipe - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Bind to RRP via Named Pipe</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-rrp-via-named-pipe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-rrp-via-named-pipe/</guid><description>Bind to RRP via Named Pipe Bind to RRP via Named Pipe - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Bind to SAMR via Named Pipe</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-samr-via-named-pipe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-samr-via-named-pipe/</guid><description>Bind to SAMR via Named Pipe Bind to SAMR via Named Pipe - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Bind to SCMR via Named Pipe</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-scmr-via-named-pipe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-scmr-via-named-pipe/</guid><description>Bind to SCMR via Named Pipe Bind to SCMR via Named Pipe - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Bind to SRVS via Named Pipe</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-srvs-via-named-pipe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-srvs-via-named-pipe/</guid><description>Bind to SRVS via Named Pipe Bind to SRVS via Named Pipe - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Bind to WKST via Named Pipe</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-wkst-via-named-pipe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/bind-to-wkst-via-named-pipe/</guid><description>Bind to WKST via Named Pipe Bind to WKST via Named Pipe - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Bit Manipulation</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/bit-manipulation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/bit-manipulation/</guid><description>Bit Manipulation Bit Manipulation - using bitwise operators (AND, OR, XOR, shifts) to solve problems efficiently at the binary level.
Related Links: Backtracking Big O Notation Divide and Conquer Dynamic Programming Graph Algorithms Greedy Algorithms Recursion Searching Sorting</description></item><item><title>Bitwise Operators and Bit Manipulation Techniques</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/bitwise-operators-and-bit-manipulation-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/bitwise-operators-and-bit-manipulation-techniques/</guid><description>Bitwise Operators and Bit Manipulation Techniques Bitwise Operators and Bit Manipulation Techniques - operators and patterns for reading, setting, clearing, and toggling individual bits in registers and data fields.
Related Links: Accessing Memory-Mapped Registers with Pointers Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Block DLL Policy</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/block-dll-policy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/block-dll-policy/</guid><description>Block DLL Policy Block DLL Policy - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Blocking Driver Loading Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/blocking-driver-loading-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/blocking-driver-loading-kernel/</guid><description>Blocking Driver Loading Kernel Blocking Driver Loading Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Bluetooth Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/bluetooth-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/bluetooth-exploits/</guid><description>Bluetooth Exploits Bluetooth Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Acoustic Communication Exploits Deauth Evil Twin Attacks Infrared Exploits Near-Field Communication (NFC) Exploits Power Line Communication Exploits Quantum Communication Exploits Radio Frequency Exploits Rogue Access Point Satellite Communication Exploits Ultrasonic Communication Exploits Visible Light Communication Exploits WiFi Exploits</description></item><item><title>Board Bring-Up and Hardware Validation</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/board-bring-up-and-hardware-validation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/board-bring-up-and-hardware-validation/</guid><description>Board Bring-Up and Hardware Validation Board Bring-Up and Hardware Validation - process of verifying a newly assembled PCB by systematically testing power rails, clocks, communication interfaces, and peripherals.
Related Links: Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>BOF Execution</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/beacon-object-files-bof/bof-execution/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/beacon-object-files-bof/bof-execution/</guid><description>BOF Execution BOF Execution - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Introduction to BOF LSASS Dump BOF Object File Loader with Module Stomping Threadless Shellcode Injection via HWBPs BOF Writing BOF Files</description></item><item><title>Boot Flow on Cortex-M</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/boot-flow-on-cortex-m/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/boot-flow-on-cortex-m/</guid><description>Boot Flow on Cortex-M Boot Flow on Cortex-M - the sequence of steps from power-on through reset vector fetch, stack pointer initialization, and startup code execution that brings a Cortex-M device to its main application.
Related Links: Exceptions Interruptions MPU Usage Patterns NVIC TrustZone-M</description></item><item><title>Breaking Authentication</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/breaking-authentication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/breaking-authentication/</guid><description>Breaking Authentication Breaking Authentication - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication Bypass Techniques Breaking Authorization Brute Force vs Password Spraying</description></item><item><title>Breaking Authorization</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/breaking-authorization/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/breaking-authorization/</guid><description>Breaking Authorization Breaking Authorization - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication Bypass Techniques Breaking Authentication Brute Force vs Password Spraying</description></item><item><title>Bring Your Own File Extension</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/bring-your-own-file-extension/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/bring-your-own-file-extension/</guid><description>Bring Your Own File Extension Bring Your Own File Extension - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Bring Your Own Protocol Handler</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/bring-your-own-protocol-handler/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/bring-your-own-protocol-handler/</guid><description>Bring Your Own Protocol Handler Bring Your Own Protocol Handler - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Bring Your Own Vulnerable Driver (BYOVD)</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/bring-your-own-vulnerable-driver-byovd/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/bring-your-own-vulnerable-driver-byovd/</guid><description>Bring Your Own Vulnerable Driver (BYOVD) Bring Your Own Vulnerable Driver (BYOVD) - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Brute Force vs Password Spraying</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/brute-force-vs-password-spraying/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/brute-force-vs-password-spraying/</guid><description>Brute Force vs Password Spraying Brute Force vs Password Spraying - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication Bypass Techniques Breaking Authentication Breaking Authorization</description></item><item><title>Brute Force vs Password Spraying Windows</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/brute-force-vs-password-spraying-windows/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/brute-force-vs-password-spraying-windows/</guid><description>Brute Force vs Password Spraying Windows Brute Force vs Password Spraying Windows - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item><item><title>Brute Forcing Key Decryption</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/brute-forcing-key-decryption/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/brute-forcing-key-decryption/</guid><description>Brute Forcing Key Decryption Brute Forcing Key Decryption - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Base N Encoder Entropy Reduction Caesar Cipher Encryption Decryption ChaCha20 Encryption Algorithm Data Encryption Techniques Encryption Fundamentals Generating Encryption Keys Without WinAPI Calls Random Key Generation RC4 SystemFunction040 Encryption Decryption XOR Encryption Decryption via Multi-Byte Key XOR Encryption Decryption via Single Byte</description></item><item><title>Buffer Overflow</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/buffer-overflow/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/buffer-overflow/</guid><description>Buffer Overflow Buffer Overflow - vulnerability caused by writing beyond the bounds of a fixed-size buffer, potentially overwriting control data or enabling arbitrary code execution.
Related Links: Firmware Exploitation Network Attacks Physical Attacks Side-Channel Attacks</description></item><item><title>Buffer Overflows</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/buffer-overflows/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/buffer-overflows/</guid><description>Buffer Overflows Buffer Overflows - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: CSRF Directory Traversal SQL Injection Timing Attacks XSS</description></item><item><title>Building a DRM-Equipped Malware</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/building-a-drm-equipped-malware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/building-a-drm-equipped-malware/</guid><description>Building a DRM-Equipped Malware Building a DRM-Equipped Malware - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Building a Loader</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/building-a-loader/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/building-a-loader/</guid><description>Building a Loader Building a Loader - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Building a PE Packer</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/building-a-pe-packer/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/building-a-pe-packer/</guid><description>Building a PE Packer Building a PE Packer - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Building an Evasive DLL Payload Loader</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/building-an-evasive-dll-payload-loader/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/building-an-evasive-dll-payload-loader/</guid><description>Building an Evasive DLL Payload Loader Building an Evasive DLL Payload Loader - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Building for scale</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/building-for-scale/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/building-for-scale/</guid><description>Building for scale Building for Scale - design principles and techniques for systems that handle growing traffic and data.
Related Links: Caching Caching Fundamentals Docker Instrumentation and monitoring Kubernetes Profiling performance System Design Fundamentals Telemetry</description></item><item><title>Burp Suite</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/burp-suite/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/burp-suite/</guid><description>Burp Suite Burp Suite - an integrated web application security testing platform used for intercepting, inspecting, and manipulating HTTP traffic.
Burp Suite Fundamentals Intercepting Proxy Intruder Repeater Scanner Related Links: Application Security Bash Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Burp Suite Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/burp-suite/burp-suite-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/burp-suite/burp-suite-fundamentals/</guid><description>Burp Suite Fundamentals Burp Suite Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Intercepting Proxy Intruder Repeater Scanner</description></item><item><title>Bus Fabrics and On-Chip Interconnects</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/bus-fabrics-and-on-chip-interconnects/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/bus-fabrics-and-on-chip-interconnects/</guid><description>Bus Fabrics and On-Chip Interconnects Bus Fabrics and On-Chip Interconnects - the internal communication infrastructure of a SoC that connects the CPU, memory, and peripherals, including AHB, APB, AXI, and crossbar fabrics.
Related Links: Arm M-profile CPU Core Concepts Heterogeneous SoCs and Co-processors Memory Architecture Power and Clock Domain Architecture RISC-V Single Core vs Multi-Core Architectures</description></item><item><title>Business Email Compromise</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/digital-social-engineering/business-email-compromise/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/digital-social-engineering/business-email-compromise/</guid><description>Business Email Compromise Business Email Compromise - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Drive-By Downloads File Sharing and Removable Media Phishing Overview Typo Squatting Watering Hole Attacks</description></item><item><title>Bypass EAF Export Address Filtering</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/bypass-eaf-export-address-filtering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/bypass-eaf-export-address-filtering/</guid><description>Bypass EAF Export Address Filtering Bypass EAF Export Address Filtering - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>C Language for Embedded Systems</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/</guid><description>C Language for Embedded Systems C Language for Embedded Systems - the programming language commonly used for developing software for embedded systems due to its efficiency and low-level control. (Note: This is different from application-level C programming, which may involve higher-level abstractions and libraries.)
Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals Related Links: Embedded Systems Architectures Embedded Systems Communication Protocols Embedded Systems Execution Models Embedded Systems Exploits Embedded Systems Hardware Embedded Systems Runtime View STM32 Microcontrollers</description></item><item><title>C Programming</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/c-programming/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/c-programming/</guid><description>C Programming C Programming - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>C2 and Networking</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/</guid><description>C2 and Networking C2 and Networking - command-and-control communication patterns, protocol abuse, and network-based techniques used in post-exploitation operations.
Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>C2 Communication Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/c2-communication-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/c2-communication-techniques/</guid><description>C2 Communication Techniques C2 Communication Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Cables, Connectors, and Physical Interfaces</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/cables-connectors-and-physical-interfaces/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/cables-connectors-and-physical-interfaces/</guid><description>Cables, Connectors, and Physical Interfaces Cables, Connectors, and Physical Interfaces - physical interconnects used to connect embedded boards to peripherals, power supplies, and debug tools.
Related Links: Board Bring-Up and Hardware Validation Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Caching</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/caching/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/caching/</guid><description>Caching Caching - technique of storing frequently accessed data in a fast storage layer to reduce latency.
Related Links: Building for scale Caching Fundamentals Docker Instrumentation and monitoring Kubernetes Profiling performance System Design Fundamentals Telemetry</description></item><item><title>Caching Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/caching-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/caching-fundamentals/</guid><description>Caching Fundamentals Caching Fundamentals - core concepts of caching to improve application performance and reduce latency.
Related Links: Building for scale Caching Docker Instrumentation and monitoring Kubernetes Profiling performance System Design Fundamentals Telemetry</description></item><item><title>Caddy</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/caddy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/caddy/</guid><description>Caddy Caddy - modern, automatic HTTPS web server with simple configuration and built-in certificate management.
Related Links: Apache Domain name Domain name system Http caching Https Nginx Fundamentals Web servers</description></item><item><title>Caesar Cipher Encryption Decryption</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/caesar-cipher-encryption-decryption/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/caesar-cipher-encryption-decryption/</guid><description>Caesar Cipher Encryption Decryption Caesar Cipher Encryption Decryption - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Base N Encoder Entropy Reduction Brute Forcing Key Decryption ChaCha20 Encryption Algorithm Data Encryption Techniques Encryption Fundamentals Generating Encryption Keys Without WinAPI Calls Random Key Generation RC4 SystemFunction040 Encryption Decryption XOR Encryption Decryption via Multi-Byte Key XOR Encryption Decryption via Single Byte</description></item><item><title>CAN Bus</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/can-bus/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/can-bus/</guid><description>CAN Bus CAN Bus - multi-master serial bus protocol used in automotive and industrial embedded systems for reliable, prioritized message exchange.
Related Links: I2C Monodon Firmware SPI UART</description></item><item><title>CAP theorem</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/cap-theorem/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/cap-theorem/</guid><description>CAP theorem CAP Theorem - principle stating distributed systems can guarantee only two of: Consistency, Availability, Partition tolerance.
Consistency - all nodes see the same data at the same time. Availability - every request receives a response, without guarantee that it contains the most recent data. Partition tolerance - the system continues to operate despite arbitrary partitioning due to network failures.
CAP Theorem Trade-offs Consistency and Partition tolerance (CP) - The system sacrifices availability to ensure data consistency during a network partition, often returning an error or time-out if data cannot be synced.</description></item><item><title>Capability-based access control</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/capability-based-access-control/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/capability-based-access-control/</guid><description>Capability-based access control Capability-Based Access Control - security model where access rights are represented as unforgeable tokens.
Related Links: Access control lists (ACLs) Attribute-based access control (ABAC) OAuth OpenID Connect (OIDC) Role-based access control (RBAC)</description></item><item><title>Capturing and Saving Screenshots into Memory</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/capturing-and-saving-screenshots-into-memory/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/capturing-and-saving-screenshots-into-memory/</guid><description>Capturing and Saving Screenshots into Memory Capturing and Saving Screenshots into Memory - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>CFG Query</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/cfg-query/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/cfg-query/</guid><description>CFG Query CFG Query - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>ChaCha20 Encryption Algorithm</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/chacha20-encryption-algorithm/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/chacha20-encryption-algorithm/</guid><description>ChaCha20 Encryption Algorithm ChaCha20 Encryption Algorithm - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Base N Encoder Entropy Reduction Brute Forcing Key Decryption Caesar Cipher Encryption Decryption Data Encryption Techniques Encryption Fundamentals Generating Encryption Keys Without WinAPI Calls Random Key Generation RC4 SystemFunction040 Encryption Decryption XOR Encryption Decryption via Multi-Byte Key XOR Encryption Decryption via Single Byte</description></item><item><title>Check Debug Object Handle</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/check-debug-object-handle/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/check-debug-object-handle/</guid><description>Check Debug Object Handle Check Debug Object Handle - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Check Debug Object Handle via NtQueryInformationProcess</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/check-debug-object-handle-via-ntqueryinformationprocess/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/check-debug-object-handle-via-ntqueryinformationprocess/</guid><description>Check Debug Object Handle via NtQueryInformationProcess Check Debug Object Handle via NtQueryInformationProcess - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Check HKCU AlwaysInstallElevated</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/check-hkcu-alwaysinstallelevated/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/check-hkcu-alwaysinstallelevated/</guid><description>Check HKCU AlwaysInstallElevated Check HKCU AlwaysInstallElevated - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item><item><title>Check HKLM AlwaysInstallElevated</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/check-hklm-alwaysinstallelevated/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/check-hklm-alwaysinstallelevated/</guid><description>Check HKLM AlwaysInstallElevated Check HKLM AlwaysInstallElevated - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item><item><title>Check Hyper-V Status</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/check-hyper-v-status/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/check-hyper-v-status/</guid><description>Check Hyper-V Status Check Hyper-V Status - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Check If Process Is WOW64</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/check-if-process-is-wow64/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/check-if-process-is-wow64/</guid><description>Check If Process Is WOW64 Check If Process Is WOW64 - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Check If RPC Server Is Listening C706 Mgmt</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/check-if-rpc-server-is-listening-c706-mgmt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/check-if-rpc-server-is-listening-c706-mgmt/</guid><description>Check If RPC Server Is Listening C706 Mgmt Check If RPC Server Is Listening C706 Mgmt - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Check Process Admin Privileges Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/check-process-admin-privileges-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/check-process-admin-privileges-kernel/</guid><description>Check Process Admin Privileges Kernel Check Process Admin Privileges Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Check Process Elevation Status</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/check-process-elevation-status/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/check-process-elevation-status/</guid><description>Check Process Elevation Status Check Process Elevation Status - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Check Token Elevation Status via NtQueryInformationToken</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/check-token-elevation-status-via-ntqueryinformationtoken/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/check-token-elevation-status-via-ntqueryinformationtoken/</guid><description>Check Token Elevation Status via NtQueryInformationToken Check Token Elevation Status via NtQueryInformationToken - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>CI-CD</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/</guid><description>CI-CD CI-CD - continuous integration, continuous delivery, and DevSecOps practices for modern software pipelines.
DevOps Fundamentals DevSecOps Pipeline and Delivery Related Links: Containers and Kubernetes DevOps and Platform Engineering Infrastructure as Code Observability and SRE</description></item><item><title>CI-CD Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/pipeline-and-delivery/ci-cd-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/pipeline-and-delivery/ci-cd-fundamentals/</guid><description>CI-CD Fundamentals CI-CD Fundamentals - automating code integration, testing, and deployment to reduce manual effort and accelerate release cycles.
Related Links: Deployment Development Phase Release Strategies Requirements and Design Phase Testing</description></item><item><title>CIA Triad</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/cia-triad/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/cia-triad/</guid><description>CIA Triad CIA Triad - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Information Security Models Overview Privacy</description></item><item><title>Circuit breakers</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/circuit-breakers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/circuit-breakers/</guid><description>Circuit breakers Circuit Breakers - pattern preventing cascading failures by stopping calls to a failing service.
Related Links: Backpressure Event-driven architecture Failure modes Graceful degradation Loadshifting Rate limiting Real time data Realtime Server sent events short polling Streaming Throttling Websockets</description></item><item><title>Class-Based Views</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/class-based-views/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/class-based-views/</guid><description>Class-Based Views Class-Based Views - reusable, composable view logic using Python classes and Django&amp;rsquo;s built-in view mixins.
Related Links: Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>Cleaning Driver Artifacts from Memory Dumps Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/cleaning-driver-artifacts-from-memory-dumps-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/cleaning-driver-artifacts-from-memory-dumps-kernel/</guid><description>Cleaning Driver Artifacts from Memory Dumps Kernel Cleaning Driver Artifacts from Memory Dumps Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>ClickFix Run Dialog Alternatives</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/clickfix-run-dialog-alternatives/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/clickfix-run-dialog-alternatives/</guid><description>ClickFix Run Dialog Alternatives ClickFix Run Dialog Alternatives - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Cloning Websites via Browser Extension Designing Custom Phishing Pages Integrating Backend Functionality Introduction to Apache Mod Rewrite Introduction to ClickFix Introduction to Flask Living Off Trusted Sites (LOTS)</description></item><item><title>Client Analysis via Cloudflare Workers</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/client-analysis-via-cloudflare-workers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/client-analysis-via-cloudflare-workers/</guid><description>Client Analysis via Cloudflare Workers Client Analysis via Cloudflare Workers - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>Client Logging Library</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/client-logging-library/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/client-logging-library/</guid><description>Client Logging Library Client Logging Library - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>Clipboard Data Theft</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/clipboard-data-theft/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/clipboard-data-theft/</guid><description>Clipboard Data Theft Clipboard Data Theft - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Clocking and Reset Circuits</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/clocking-and-reset-circuits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/clocking-and-reset-circuits/</guid><description>Clocking and Reset Circuits Clocking and Reset Circuits - oscillators, PLLs, and reset logic that establish and maintain the timing and initialization state of a microcontroller.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Cloning Detection Mechanisms</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/cloning-detection-mechanisms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/cloning-detection-mechanisms/</guid><description>Cloning Detection Mechanisms Cloning Detection Mechanisms - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Cloning Websites via Browser Extension</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/cloning-websites-via-browser-extension/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/cloning-websites-via-browser-extension/</guid><description>Cloning Websites via Browser Extension Cloning Websites via Browser Extension - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ClickFix Run Dialog Alternatives Designing Custom Phishing Pages Integrating Backend Functionality Introduction to Apache Mod Rewrite Introduction to ClickFix Introduction to Flask Living Off Trusted Sites (LOTS)</description></item><item><title>Code Obfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/</guid><description>Code Obfuscation Code Obfuscation - techniques that transform malware code to disguise its true purpose and evade signature-based and heuristic detection.
AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques Related Links: AMSI Bypass Anti-Analysis Automated Obfuscation Techniques Covering Tracks ETW Bypass NTDLL Unhooking and API Hooking</description></item><item><title>Code Obfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/code-obfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/code-obfuscation/</guid><description>Code Obfuscation Code Obfuscation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Code reviews</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/code-reviews/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/code-reviews/</guid><description>Code reviews Code Reviews - process of systematically checking code quality, correctness, and maintainability.
Related Links: Documentation generation Functional testing Git Integration testing Refactoring Unit testing</description></item><item><title>Collecting and Analyzing Bot Telemetry</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/collecting-and-analyzing-bot-telemetry/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/collecting-and-analyzing-bot-telemetry/</guid><description>Collecting and Analyzing Bot Telemetry Collecting and Analyzing Bot Telemetry - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>Collecting and Analyzing JA4 Bot Telemetry</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/collecting-and-analyzing-ja4-bot-telemetry/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/collecting-and-analyzing-ja4-bot-telemetry/</guid><description>Collecting and Analyzing JA4 Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>Column dbs</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/column-dbs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/column-dbs/</guid><description>Column dbs Column Databases - databases storing data by columns instead of rows for analytical query performance.
Related Links: Document dbs Elasticsearch Graphdbs Key value Memcached Non-relational databases NoSQL databases Redis Relational databases Search engines Solr Time series dbs Vector databases</description></item><item><title>Command and Control Patterns</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/command-and-control-patterns/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/command-and-control-patterns/</guid><description>Command and Control Patterns Command and Control Patterns - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Command Line Argument Spoofing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/command-line-argument-spoofing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/command-line-argument-spoofing/</guid><description>Command Line Argument Spoofing Command Line Argument Spoofing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Common Exploit Frameworks and Tools</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/common-exploit-frameworks-and-tools/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/common-exploit-frameworks-and-tools/</guid><description>Common Exploit Frameworks and Tools Common Exploit Frameworks and Tools - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Injection Attacks OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks</description></item><item><title>Common table expressions (CTEs)</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/common-table-expressions-ctes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/common-table-expressions-ctes/</guid><description>Common table expressions (CTEs) Common Table Expressions - temporary named result sets within a SQL statement for cleaner query structure.
Related Links: Advanced SQL Aggregate queries Dynamic SQL Join queries Pivot and unpivot operations Recursive queries Select, insert, delete, update statements Stored procedures and triggers Subqueries Views Window functions</description></item><item><title>Compile-Time GetModuleHandle</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/compile-time-getmodulehandle/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/compile-time-getmodulehandle/</guid><description>Compile-Time GetModuleHandle Compile-Time GetModuleHandle - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Compile-Time GetProcAddress</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/compile-time-getprocaddress/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/compile-time-getprocaddress/</guid><description>Compile-Time GetProcAddress Compile-Time GetProcAddress - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Compile-Time Hash Obfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/compile-time-hash-obfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/compile-time-hash-obfuscation/</guid><description>Compile-Time Hash Obfuscation Compile-Time Hash Obfuscation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Compile-Time String Encryption</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/compile-time-string-encryption/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/compile-time-string-encryption/</guid><description>Compile-Time String Encryption Compile-Time String Encryption - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Compiler Optimization Behavior and volatile Fixes</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/compiler-optimization-behavior-and-volatile-fixes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/compiler-optimization-behavior-and-volatile-fixes/</guid><description>Compiler Optimization Behavior and volatile Fixes Compiler Optimization Behavior and volatile Fixes - how compilers reorder or eliminate memory accesses and how the volatile qualifier prevents such optimizations on hardware-mapped variables.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Complex const and volatile Combinations</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/complex-const-and-volatile-combinations/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/complex-const-and-volatile-combinations/</guid><description>Complex const and volatile Combinations Complex const and volatile Combinations - combined use of const and volatile qualifiers to model read-only hardware registers and shared data in embedded C.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Concurrency</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/</guid><description>Concurrency Concurrency - patterns and techniques for handling parallel execution, async processing, and real-time data.
Backpressure Circuit breakers Event-driven architecture Failure modes Graceful degradation Loadshifting Rate limiting Real time data Realtime Server sent events short polling Streaming Throttling Websockets Related Links: Backend Engineering Databases Django DSA Python Security System Design Web</description></item><item><title>Configuration Management Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/iac-tools/configuration-management-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/iac-tools/configuration-management-fundamentals/</guid><description>Configuration Management Fundamentals Configuration Management Fundamentals - maintaining desired system state consistently across environments using idempotent tooling.
Related Links: IaC Security Infrastructure as Code Fundamentals Terraform Fundamentals</description></item><item><title>Connect to SAMR Server MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/connect-to-samr-server-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/connect-to-samr-server-ms-samr/</guid><description>Connect to SAMR Server MS-SAMR Connect to SAMR Server MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Container Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/containers-and-kubernetes/container-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/containers-and-kubernetes/container-fundamentals/</guid><description>Container Fundamentals Container Fundamentals - packaging applications with dependencies into portable, isolated units using Docker images and layers.
Related Links: Container Scanning Tools Docker Security Kubernetes Fundamentals Kubernetes Security Kubernetes Security Basics</description></item><item><title>Container Scanning Tools</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/containers-and-kubernetes/container-scanning-tools/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/containers-and-kubernetes/container-scanning-tools/</guid><description>Container Scanning Tools Container Scanning Tools - automated tools for detecting known CVEs and misconfigurations in container images before deployment.
Related Links: Container Fundamentals Docker Security Kubernetes Fundamentals Kubernetes Security Kubernetes Security Basics</description></item><item><title>Container security best practices</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/container-security-best-practices/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/container-security-best-practices/</guid><description>Container security best practices Container Security Best Practices - guidelines for securing Docker and container-based deployments.
Related Links: API security best practices CORS CSP Mitigation techniques OWASP risks Server security</description></item><item><title>Containers and Kubernetes</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/containers-and-kubernetes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/containers-and-kubernetes/</guid><description>Containers and Kubernetes Containers and Kubernetes - containerization fundamentals, orchestration, and security for cloud-native applications.
Container Fundamentals Container Scanning Tools Docker Security Kubernetes Fundamentals Kubernetes Security Kubernetes Security Basics Related Links: CI-CD DevOps and Platform Engineering Infrastructure as Code Observability and SRE</description></item><item><title>Control Flow for Firmware</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/control-flow-for-firmware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/control-flow-for-firmware/</guid><description>Control Flow for Firmware Control Flow for Firmware - use of conditionals, loops, and switch statements in firmware, including considerations for deterministic execution and avoiding undefined behavior.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Controlling Payload Execution</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/controlling-payload-execution/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/controlling-payload-execution/</guid><description>Controlling Payload Execution Controlling Payload Execution - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Cooperative Scheduling</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/cooperative-scheduling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/cooperative-scheduling/</guid><description>Cooperative Scheduling Cooperative Scheduling - execution model where tasks voluntarily yield the processor, requiring explicit hand-off points to ensure fairness and responsiveness.
Related Links: Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>CORS</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/cors/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/cors/</guid><description>CORS CORS - browser security mechanism controlling how web pages request resources from different origins.
Related Links: API security best practices Container security best practices CSP Mitigation techniques OWASP risks Server security</description></item><item><title>Covering Tracks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/</guid><description>Covering Tracks Covering Tracks - techniques to erase or tamper with forensic evidence including logs, timestamps, and file system artifacts after a compromise.
Anti-Forensic Techniques Covering Tracks Techniques Data Destruction Techniques File Time Stomping Log Tampering Techniques Self-Deletion Techniques Shadow Copy Deletion Timestomping Techniques Related Links: AMSI Bypass Anti-Analysis Automated Obfuscation Techniques Code Obfuscation ETW Bypass NTDLL Unhooking and API Hooking</description></item><item><title>Covering Tracks Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/covering-tracks-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/covering-tracks-techniques/</guid><description>Covering Tracks Techniques Covering Tracks Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Forensic Techniques Data Destruction Techniques File Time Stomping Log Tampering Techniques Self-Deletion Techniques Shadow Copy Deletion Timestomping Techniques</description></item><item><title>CPU Core Concepts</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/cpu-core-concepts/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/cpu-core-concepts/</guid><description>CPU Core Concepts CPU Core Concepts - fundamental principles of processor design relevant to embedded systems, including instruction set architectures, pipeline stages, and privilege levels.
ISA Privilege Levels Related Links: Arm M-profile Bus Fabrics and On-Chip Interconnects Heterogeneous SoCs and Co-processors Memory Architecture Power and Clock Domain Architecture RISC-V Single Core vs Multi-Core Architectures</description></item><item><title>CRC DJB2 Lose Lose Hashing Algorithms</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/hashing/crc-djb2-lose-lose-hashing-algorithms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/hashing/crc-djb2-lose-lose-hashing-algorithms/</guid><description>CRC DJB2 Lose Lose Hashing Algorithms CRC DJB2 Lose Lose Hashing Algorithms - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Hashing Fundamentals Multiple Hashing Algorithms</description></item><item><title>Create a DLL Template</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/create-a-dll-template/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/create-a-dll-template/</guid><description>Create a DLL Template Create a DLL Template - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Create a Group MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/create-a-group-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/create-a-group-ms-samr/</guid><description>Create a Group MS-SAMR Create a Group MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Create Local Remote Service</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/create-local-remote-service/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/create-local-remote-service/</guid><description>Create Local Remote Service Create Local Remote Service - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Create Local User</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/create-local-user/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/create-local-user/</guid><description>Create Local User Create Local User - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Create Local User Account</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/create-local-user-account/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/create-local-user-account/</guid><description>Create Local User Account Create Local User Account - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Create Remote Service</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/create-remote-service/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/create-remote-service/</guid><description>Create Remote Service Create Remote Service - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Create Shortcut via IShellLink COM Interface</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/create-shortcut-via-ishelllink-com-interface/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/create-shortcut-via-ishelllink-com-interface/</guid><description>Create Shortcut via IShellLink COM Interface Create Shortcut via IShellLink COM Interface - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Active Directory Active Directory Enumeration File Creation File Operations Windows Administration Windows Exploitation Write File to Disk</description></item><item><title>Credential Dumping</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/</guid><description>Credential Dumping Credential Dumping - techniques for extracting authentication credentials from memory, registry, disk, and browser storage on compromised systems.
Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping Related Links: Beacon Object Files (BOF) C2 and Networking Malware Concepts Payload and PE Persistence Process Injection Sleep Obfuscation Windows Internals</description></item><item><title>Cross-Architecture Injection x86 to x64</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/cross-architecture-injection-x86-to-x64/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/cross-architecture-injection-x86-to-x64/</guid><description>Cross-Architecture Injection x86 to x64 Cross-Architecture Injection x86 to x64 - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>CRT Library Removal</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/crt-library-removal/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/crt-library-removal/</guid><description>CRT Library Removal CRT Library Removal - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>CRT Removal</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/crt-removal/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/crt-removal/</guid><description>CRT Removal CRT Removal - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Cryptographic Algorithms</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/cryptographic-algorithms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/cryptographic-algorithms/</guid><description>Cryptographic Algorithms Cryptographic Algorithms - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Cryptography Fundamentals Data Anonymization Techniques Data Masking Techniques Secure Communication Techniques Steganography</description></item><item><title>Cryptography</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/</guid><description>Cryptography Cryptography - cryptographic primitives and protocols used to protect data integrity, confidentiality, and authenticity.
Argon2 Bcrypt Hashing algorithms MD5 Scrypt SHA-1 SHA-256 TLS Related Links: Authentication Authorization Web Security</description></item><item><title>Cryptography</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/</guid><description>Cryptography Cryptography - the study of techniques for secure communication and data protection using mathematical algorithms and protocols.
Cryptographic Algorithms Cryptography Fundamentals Data Anonymization Techniques Data Masking Techniques Secure Communication Techniques Steganography Related Links: Application Security Bash Burp Suite Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Cryptography Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/cryptography-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/cryptography-fundamentals/</guid><description>Cryptography Fundamentals Cryptography Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Cryptographic Algorithms Data Anonymization Techniques Data Masking Techniques Secure Communication Techniques Steganography</description></item><item><title>Cryptojacking Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/cryptojacking-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/cryptojacking-exploits/</guid><description>Cryptojacking Exploits Cryptojacking Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>CSP</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/csp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/csp/</guid><description>CSP Content Security Policy - HTTP security header restricting resource loading to prevent XSS attacks.
Related Links: API security best practices Container security best practices CORS Mitigation techniques OWASP risks Server security</description></item><item><title>CSRF</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/csrf/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/csrf/</guid><description>CSRF CSRF - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Buffer Overflows Directory Traversal SQL Injection Timing Attacks XSS</description></item><item><title>Custom Built Tools Demonstration</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/custom-built-tools-demonstration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/custom-built-tools-demonstration/</guid><description>Custom Built Tools Demonstration Custom Built Tools Demonstration - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Custom SMB Client</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/custom-smb-client/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/custom-smb-client/</guid><description>Custom SMB Client Custom SMB Client - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Custom User Model</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/custom-user-model/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/custom-user-model/</guid><description>Custom User Model Custom User Model - extending AbstractUser or AbstractBaseUser to add custom fields, managers, and auth behavior.
Related Links: Class-Based Views Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>Custom WinAPI Functions</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/custom-winapi-functions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/custom-winapi-functions/</guid><description>Custom WinAPI Functions Custom WinAPI Functions - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Customizing Evilginx OPSEC Configuration</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/customizing-evilginx-opsec-configuration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/customizing-evilginx-opsec-configuration/</guid><description>Customizing Evilginx OPSEC Configuration Customizing Evilginx OPSEC Configuration - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Dynamic Device Code Phishing Evilginx Phishlet Development Evilginx URL Rewriting GitHub Device Code Phishing GitLab Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Microsoft Device Code Phishing Protecting Evilginx Server via Caddy</description></item><item><title>Cybersecurity</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/</guid><description>Cybersecurity Map Cybersecurity - the practice of protecting computer systems, networks, and data from unauthorized access, attacks, and damage.
Application Security Bash Burp Suite Cryptography Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark Related Links: Backend Engineering DevOps and Platform Engineering Embedded Systems Home</description></item><item><title>Data Anonymization Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/data-anonymization-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/data-anonymization-techniques/</guid><description>Data Anonymization Techniques Data Anonymization Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Cryptographic Algorithms Cryptography Fundamentals Data Masking Techniques Secure Communication Techniques Steganography</description></item><item><title>Data constraints</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/data-constraints/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/data-constraints/</guid><description>Data constraints Data Constraints - rules enforced at the database level to ensure data integrity and validity.
Related Links: ACID CAP theorem Data definition language Data integrity and normalization and security Data manipulation language Databases and Data Modeling Migrations Normalization ORMs Transactions Transactions and isolation levels</description></item><item><title>Data definition language</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/data-definition-language/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/data-definition-language/</guid><description>Data definition language Data Definition Language - SQL commands for defining and modifying database schema structures.
Related Links: ACID CAP theorem Data constraints Data integrity and normalization and security Data manipulation language Databases and Data Modeling Migrations Normalization ORMs Transactions Transactions and isolation levels</description></item><item><title>Data Destruction Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/data-destruction-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/data-destruction-techniques/</guid><description>Data Destruction Techniques Data Destruction Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Forensic Techniques Covering Tracks Techniques File Time Stomping Log Tampering Techniques Self-Deletion Techniques Shadow Copy Deletion Timestomping Techniques</description></item><item><title>Data Encryption Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/data-encryption-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/data-encryption-techniques/</guid><description>Data Encryption Techniques Data Encryption Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Base N Encoder Entropy Reduction Brute Forcing Key Decryption Caesar Cipher Encryption Decryption ChaCha20 Encryption Algorithm Encryption Fundamentals Generating Encryption Keys Without WinAPI Calls Random Key Generation RC4 SystemFunction040 Encryption Decryption XOR Encryption Decryption via Multi-Byte Key XOR Encryption Decryption via Single Byte</description></item><item><title>Data Exfiltration Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/data-exfiltration-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/data-exfiltration-techniques/</guid><description>Data Exfiltration Techniques Data Exfiltration Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Data integrity and normalization and security</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/data-integrity-and-normalization-and-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/data-integrity-and-normalization-and-security/</guid><description>Data integrity and normalization and security Data Integrity, Normalization, and Security - practices ensuring data correctness, minimal redundancy, and protection.
Related Links: ACID CAP theorem Data constraints Data definition language Data manipulation language Databases and Data Modeling Migrations Normalization ORMs Transactions Transactions and isolation levels</description></item><item><title>Data manipulation language</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/data-manipulation-language/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/data-manipulation-language/</guid><description>Data manipulation language Data Manipulation Language - SQL commands for querying and modifying data within tables.
Related Links: ACID CAP theorem Data constraints Data definition language Data integrity and normalization and security Databases and Data Modeling Migrations Normalization ORMs Transactions Transactions and isolation levels</description></item><item><title>Data Masking Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/data-masking-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/data-masking-techniques/</guid><description>Data Masking Techniques Data Masking Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Cryptographic Algorithms Cryptography Fundamentals Data Anonymization Techniques Secure Communication Techniques Steganography</description></item><item><title>Data replication</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/data-replication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/data-replication/</guid><description>Data replication Data Replication - process of copying data across multiple database servers for availability and redundancy.
Related Links: Database index Database scaling Indexes and performance optimization Indexing and Query Performance N+1 query problem Performance tuning and query optimization Sharding</description></item><item><title>Data Structures</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/</guid><description>Data Structures Data Structures - fundamental data structures every engineer must know, with Python 3 implementations and complexity analysis.
Arrays Binary Search Trees Graphs Hash Tables Heaps Linked Lists Queues Sets Stacks Strings Trees Tries Related Links: Algorithms Patterns</description></item><item><title>Data Types, Variables, and Storage Class Specifiers</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/data-types-variables-and-storage-class-specifiers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/data-types-variables-and-storage-class-specifiers/</guid><description>Data Types, Variables, and Storage Class Specifiers Data Types, Variables, and Storage Class Specifiers - fixed-width integer types, alignment, storage classes (auto, static, extern, register), and their impact on memory layout.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Database Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/</guid><description>Database Fundamentals Database Fundamentals - core concepts underlying all database systems including transactions, ACID, normalization, and data modeling.
ACID CAP theorem Data constraints Data definition language Data integrity and normalization and security Data manipulation language Databases and Data Modeling Migrations Normalization ORMs Transactions Transactions and isolation levels Related Links: Database Performance Database Types SQL</description></item><item><title>Database index</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/database-index/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/database-index/</guid><description>Database index Database Index - data structure improving the speed of data retrieval operations on a database table.
Related Links: Data replication Database scaling Indexes and performance optimization Indexing and Query Performance N+1 query problem Performance tuning and query optimization Sharding</description></item><item><title>Database Performance</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/</guid><description>Database Performance Database Performance - techniques for indexing, scaling, and optimizing database queries and infrastructure.
Data replication Database index Database scaling Indexes and performance optimization Indexing and Query Performance N+1 query problem Performance tuning and query optimization Sharding Related Links: Database Fundamentals Database Types SQL</description></item><item><title>Database scaling</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/database-scaling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/database-scaling/</guid><description>Database scaling Database Scaling - strategies for handling increasing database load through vertical or horizontal scaling.
Related Links: Data replication Database index Indexes and performance optimization Indexing and Query Performance N+1 query problem Performance tuning and query optimization Sharding</description></item><item><title>Database Setup MySQL</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/database-setup-mysql/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/database-setup-mysql/</guid><description>Database Setup MySQL Database Setup MySQL - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Database Types</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/</guid><description>Database Types Database Types - survey of relational, NoSQL, and specialized database systems and their appropriate use cases.
Column dbs Document dbs Elasticsearch Graphdbs Key value Memcached Non-relational databases NoSQL databases Redis Relational databases Search engines Solr Time series dbs Vector databases Related Links: Database Fundamentals Database Performance SQL</description></item><item><title>Databases</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/</guid><description>Databases Databases - foundational database systems covering SQL, NoSQL, data modeling, and performance for backend development.
Database Fundamentals Database Performance Database Types SQL Related Links: Backend Engineering Concurrency Django DSA Python Security System Design Web</description></item><item><title>Databases and Data Modeling</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/databases-and-data-modeling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/databases-and-data-modeling/</guid><description>Databases and Data Modeling Databases and Data Modeling - design principles for organizing and representing data in database systems.
Related Links: ACID CAP theorem Data constraints Data definition language Data integrity and normalization and security Data manipulation language Migrations Normalization ORMs Transactions Transactions and isolation levels</description></item><item><title>Deauth</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/deauth/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/deauth/</guid><description>Deauth Deauth - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Acoustic Communication Exploits Bluetooth Exploits Evil Twin Attacks Infrared Exploits Near-Field Communication (NFC) Exploits Power Line Communication Exploits Quantum Communication Exploits Radio Frequency Exploits Rogue Access Point Satellite Communication Exploits Ultrasonic Communication Exploits Visible Light Communication Exploits WiFi Exploits</description></item><item><title>Debug and Programming Hardware</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/debug-and-programming-hardware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/debug-and-programming-hardware/</guid><description>Debug and Programming Hardware Debug and Programming Hardware - tools and circuits used to flash firmware and debug running code, including JTAG, SWD, and debug adapters.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Defensive C Patterns for Vulnerability Prevention</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/defensive-c-patterns-for-vulnerability-prevention/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/defensive-c-patterns-for-vulnerability-prevention/</guid><description>Defensive C Patterns for Vulnerability Prevention Defensive C Patterns for Vulnerability Prevention - coding practices that reduce common firmware vulnerabilities such as buffer overflows, integer wrapping, and uninitialized memory use.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Delete a Group MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/delete-a-group-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/delete-a-group-ms-samr/</guid><description>Delete a Group MS-SAMR Delete a Group MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Delete Remote Service</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/delete-remote-service/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/delete-remote-service/</guid><description>Delete Remote Service Delete Remote Service - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Deploying Phishing Infrastructure</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/deploying-phishing-infrastructure/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/deploying-phishing-infrastructure/</guid><description>Deploying Phishing Infrastructure Deploying Phishing Infrastructure - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Deployment</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/deployment/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/deployment/</guid><description>Deployment Deployment - serving Django with Gunicorn or uWSGI behind Nginx, managing environment secrets, and deploying to cloud platforms.
Related Links: Class-Based Views Custom User Model Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>Deployment</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/pipeline-and-delivery/deployment/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/pipeline-and-delivery/deployment/</guid><description>Deployment Deployment - strategies and practices for releasing software to staging and production environments reliably.
Related Links: CI-CD Fundamentals Development Phase Release Strategies Requirements and Design Phase Testing</description></item><item><title>Designing Custom Phishing Pages</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/designing-custom-phishing-pages/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/designing-custom-phishing-pages/</guid><description>Designing Custom Phishing Pages Designing Custom Phishing Pages - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ClickFix Run Dialog Alternatives Cloning Websites via Browser Extension Integrating Backend Functionality Introduction to Apache Mod Rewrite Introduction to ClickFix Introduction to Flask Living Off Trusted Sites (LOTS)</description></item><item><title>Detect Virtualization Methods</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/detect-virtualization-methods/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/detect-virtualization-methods/</guid><description>Detect Virtualization Methods Detect Virtualization Methods - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Detect Virtualization via Hardware Specification</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/detect-virtualization-via-hardware-specification/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/detect-virtualization-via-hardware-specification/</guid><description>Detect Virtualization via Hardware Specification Detect Virtualization via Hardware Specification - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Detect Virtualization via Monitor Resolution</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/detect-virtualization-via-monitor-resolution/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/detect-virtualization-via-monitor-resolution/</guid><description>Detect Virtualization via Monitor Resolution Detect Virtualization via Monitor Resolution - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Detect Virtualization via User Interaction</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/detect-virtualization-via-user-interaction/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/detect-virtualization-via-user-interaction/</guid><description>Detect Virtualization via User Interaction Detect Virtualization via User Interaction - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Detect Virtualized Environments</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/detect-virtualized-environments/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/detect-virtualized-environments/</guid><description>Detect Virtualized Environments Detect Virtualized Environments - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Detecting Headless Browsers via WebDriver Property</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/detecting-headless-browsers-via-webdriver-property/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/detecting-headless-browsers-via-webdriver-property/</guid><description>Detecting Headless Browsers via WebDriver Property Detecting Headless Browsers via WebDriver Property - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>Detection Engineering</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/detection-engineering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/detection-engineering/</guid><description>Detection Engineering Detection Engineering - the systematic development and tuning of detection rules, analytics, and coverage mappings against adversary techniques.
Detection Engineering Fundamentals MITRE ATT&amp;amp;CK Mapping Related Links: Endpoint Security SIEM and Tools SOC Honeypots Threat Hunting Techniques</description></item><item><title>Detection Engineering Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/detection-engineering/detection-engineering-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/detection-engineering/detection-engineering-fundamentals/</guid><description>Detection Engineering Fundamentals Detection Engineering Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: MITRE ATT&amp;amp;CK Mapping</description></item><item><title>Developing a Keylogger</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/developing-a-keylogger/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/developing-a-keylogger/</guid><description>Developing a Keylogger Developing a Keylogger - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Development Phase</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/pipeline-and-delivery/development-phase/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/pipeline-and-delivery/development-phase/</guid><description>Development Phase Development Phase - DevOps practices during the coding phase including version control, code review, and pre-commit checks.
Related Links: CI-CD Fundamentals Deployment Release Strategies Requirements and Design Phase Testing</description></item><item><title>DevOps and DevSecOps Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devops-fundamentals/devops-and-devsecops-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devops-fundamentals/devops-and-devsecops-fundamentals/</guid><description>DevOps and DevSecOps Fundamentals DevOps and DevSecOps Fundamentals - culture and practices combining development, operations, and security for faster, safer software delivery.
Related Links: Agile and Scrum Phases of DevOps Software Delivery Models Waterfall vs Agile vs DevOps</description></item><item><title>DevOps and Platform Engineering</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/</guid><description>DevOps and Platform Engineering DevOps and Platform Engineering - practices, tools, and methodologies for software delivery, infrastructure management, and operational excellence.
CI-CD Containers and Kubernetes Infrastructure as Code Observability and SRE Related Links: Backend Engineering Cybersecurity Embedded Systems Home</description></item><item><title>DevOps Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devops-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devops-fundamentals/</guid><description>DevOps Fundamentals DevOps Fundamentals - foundational concepts and methodologies underlying the DevOps and DevSecOps culture.
Agile and Scrum DevOps and DevSecOps Fundamentals Phases of DevOps Software Delivery Models Waterfall vs Agile vs DevOps Related Links: DevSecOps Pipeline and Delivery</description></item><item><title>DevSecOps</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/</guid><description>DevSecOps DevSecOps - integrating security into every phase of the CI/CD pipeline through automated testing and tooling.
API Security Arachni Dynamic application security testing (DAST) Nikto Pipeline Security Shift Left Security Software composition analysis (SCA) Static application security testing (SAST) W3af Related Links: DevOps Fundamentals Pipeline and Delivery</description></item><item><title>DFS Pattern</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/dfs-pattern/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/dfs-pattern/</guid><description>DFS Pattern DFS Pattern - depth-first search template for path finding, cycle detection, and exhaustive graph or tree exploration.
Related Links: BFS Pattern Binary Search Pattern Fast and Slow Pointers Merge Intervals Monotonic Stack Sliding Window Top K Elements Two Pointers Union Find</description></item><item><title>Digital and Analog Peripherals</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/digital-and-analog-peripherals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/digital-and-analog-peripherals/</guid><description>Digital and Analog Peripherals Digital and Analog Peripherals - microcontroller-integrated or external digital and analog devices such as GPIOs, ADCs, DACs, and timers.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Digital Forensics</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/digital-forensics/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/digital-forensics/</guid><description>Digital Forensics Digital Forensics - the collection, preservation, and analysis of digital evidence from storage media, memory, and network artifacts.
Disk Forensics Host Forensics Fundamentals Memory Forensics Related Links: Anti-Forensic Techniques Automated Reverse Engineering Forensics Hayabusa Incident Response Threat Hunting Techniques</description></item><item><title>Digital Social Engineering</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/digital-social-engineering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/digital-social-engineering/</guid><description>Digital Social Engineering Digital Social Engineering - online-based manipulation techniques that exploit trust, urgency, and human psychology to achieve unauthorized access.
Business Email Compromise Drive-By Downloads File Sharing and Removable Media Phishing Overview Typo Squatting Watering Hole Attacks Related Links: Automated Social Engineering Techniques Automated Spear Phishing Email Generation Physical Social Engineering Social Engineering Fundamentals Social Engineering Techniques</description></item><item><title>Directory Traversal</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/directory-traversal/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/directory-traversal/</guid><description>Directory Traversal Directory Traversal - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Buffer Overflows CSRF SQL Injection Timing Attacks XSS</description></item><item><title>Disabling the Debugger Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/disabling-the-debugger-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/disabling-the-debugger-kernel/</guid><description>Disabling the Debugger Kernel Disabling the Debugger Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Disk Forensics</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/digital-forensics/disk-forensics/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/digital-forensics/disk-forensics/</guid><description>Disk Forensics Disk Forensics - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Host Forensics Fundamentals Memory Forensics</description></item><item><title>Disk Interaction</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/disk-interaction/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/disk-interaction/</guid><description>Disk Interaction Disk Interaction - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Divide and Conquer</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/divide-and-conquer/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/divide-and-conquer/</guid><description>Divide and Conquer Divide and Conquer - paradigm splitting a problem into independent subproblems, solving each, then combining results.
Related Links: Backtracking Big O Notation Bit Manipulation Dynamic Programming Graph Algorithms Greedy Algorithms Recursion Searching Sorting</description></item><item><title>Django</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/</guid><description>Django Django - high-level Python web framework for rapid, secure, and scalable web application development.
Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication Related Links: Backend Engineering Concurrency Databases DSA Python Security System Design Web</description></item><item><title>Django Admin</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/django-admin/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/django-admin/</guid><description>Django Admin Django Admin - auto-generated administrative interface for managing model data with customizable list views and actions.
Related Links: Class-Based Views Custom User Model Deployment Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>Django Security</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/django-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/django-security/</guid><description>Django Security Django Security - CSRF protection, SQL injection prevention, XSS defense, clickjacking protection, and secure headers.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>Django Testing</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/django-testing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/django-testing/</guid><description>Django Testing Django Testing - writing unit and integration tests with Django&amp;rsquo;s TestCase, RequestFactory, and Client.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>DLL Hijacking</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/dll-hijacking/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/dll-hijacking/</guid><description>DLL Hijacking DLL Hijacking - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item><item><title>DLL Injection via ZwCreateThreadEx Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/dll-injection-via-zwcreatethreadex-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/dll-injection-via-zwcreatethreadex-kernel/</guid><description>DLL Injection via ZwCreateThreadEx Kernel DLL Injection via ZwCreateThreadEx Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>DLL Injection via ZwCreateThreadEx Kernel Internals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/dll-injection-via-zwcreatethreadex-kernel-internals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/dll-injection-via-zwcreatethreadex-kernel-internals/</guid><description>DLL Injection via ZwCreateThreadEx Kernel Internals DLL Injection via ZwCreateThreadEx Kernel Internals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>DLL Sideloading for EDR Evasion</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/dll-sideloading-for-edr-evasion/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/dll-sideloading-for-edr-evasion/</guid><description>DLL Sideloading for EDR Evasion DLL Sideloading for EDR Evasion - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>DLL Sideloading Overview</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/dll-sideloading-overview/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/dll-sideloading-overview/</guid><description>DLL Sideloading Overview DLL Sideloading Overview - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>DLL Sideloading Practical Example</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/dll-sideloading-practical-example/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/dll-sideloading-practical-example/</guid><description>DLL Sideloading Practical Example DLL Sideloading Practical Example - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>DLL Sideloading via at.exe</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/dll-sideloading-via-at.exe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/dll-sideloading-via-at.exe/</guid><description>DLL Sideloading via at.exe DLL Sideloading via at.exe - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>DMZ</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/dmz/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/dmz/</guid><description>DMZ DMZ - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Firewalls Overview Honeypots Jump Server Microsegmentation Network Segmentation Port Blocking Zero Trust Architecture</description></item><item><title>DNS</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-protocols/dns/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-protocols/dns/</guid><description>DNS DNS - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Handshakes HTTPS Networking Networking Fundamentals Subnetting</description></item><item><title>DNS Lookup</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/dns-lookup/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/dns-lookup/</guid><description>DNS Lookup DNS Lookup - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Host Check ICMP Echo Network Attacks Network Evasion Techniques Network Protocols Port Scanning TCP Port Scan VPNs Wireless and Physical Attacks</description></item><item><title>DNS Poisoning</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/dns-poisoning/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/dns-poisoning/</guid><description>DNS Poisoning DNS Poisoning - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: MITM Network Attacks Overview Packet Sniffing Exploits Spoofing VLAN Hopping VMescape Exploits</description></item><item><title>Docker</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/docker/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/docker/</guid><description>Docker Docker - platform for building, shipping, and running applications in lightweight portable containers.
Related Links: Building for scale Caching Caching Fundamentals Instrumentation and monitoring Kubernetes Profiling performance System Design Fundamentals Telemetry</description></item><item><title>Docker Security</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/containers-and-kubernetes/docker-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/containers-and-kubernetes/docker-security/</guid><description>Docker Security Docker Security - hardening Docker configurations including rootless containers, read-only filesystems, and minimal base images.
Related Links: Container Fundamentals Container Scanning Tools Kubernetes Fundamentals Kubernetes Security Kubernetes Security Basics</description></item><item><title>Document dbs</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/document-dbs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/document-dbs/</guid><description>Document dbs Document Databases - NoSQL databases storing data as flexible JSON-like documents.
Related Links: Column dbs Elasticsearch Graphdbs Key value Memcached Non-relational databases NoSQL databases Redis Relational databases Search engines Solr Time series dbs Vector databases</description></item><item><title>Documentation generation</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/documentation-generation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/documentation-generation/</guid><description>Documentation generation Documentation Generation - tools and practices for automatically generating API and code documentation.
Related Links: Code reviews Functional testing Git Integration testing Refactoring Unit testing</description></item><item><title>Domain and DNS Configuration</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/domain-and-dns-configuration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/domain-and-dns-configuration/</guid><description>Domain and DNS Configuration Domain and DNS Configuration - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Domain Generation Algorithms (DGA)</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/domain-generation-algorithms-dga/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/domain-generation-algorithms-dga/</guid><description>Domain Generation Algorithms (DGA) Domain Generation Algorithms (DGA) - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Domain Join Check</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/domain-join-check/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/domain-join-check/</guid><description>Domain Join Check Domain Join Check - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Domain name</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/domain-name/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/domain-name/</guid><description>Domain name Domain Name - human-readable address that maps to an IP address for identifying resources on the internet.
Related Links: Apache Caddy Domain name system Http caching Https Nginx Fundamentals Web servers</description></item><item><title>Domain name system</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/domain-name-system/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/domain-name-system/</guid><description>Domain name system Domain Name System - hierarchical naming system that translates domain names to their IP addresses.
Related Links: Apache Caddy Domain name Http caching Https Nginx Fundamentals Web servers</description></item><item><title>Domain Registration Kill Switch</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/domain-registration-kill-switch/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/domain-registration-kill-switch/</guid><description>Domain Registration Kill Switch Domain Registration Kill Switch - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Download and Upload via SMB</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/download-and-upload-via-smb/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/download-and-upload-via-smb/</guid><description>Download and Upload via SMB Download and Upload via SMB - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Download File via BITS</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/download-file-via-bits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/download-file-via-bits/</guid><description>Download File via BITS Download File via BITS - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Drive-By Downloads</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/digital-social-engineering/drive-by-downloads/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/digital-social-engineering/drive-by-downloads/</guid><description>Drive-By Downloads Drive-By Downloads - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Business Email Compromise File Sharing and Removable Media Phishing Overview Typo Squatting Watering Hole Attacks</description></item><item><title>DRM-Equipped Malware</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/drm-equipped-malware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/drm-equipped-malware/</guid><description>DRM-Equipped Malware DRM-Equipped Malware - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>DSA</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/</guid><description>DSA DSA - data structures and algorithms covering must-know topics for technical interviews, implemented in Python 3.
Algorithms Data Structures Patterns Related Links: Backend Engineering Concurrency Databases Django Python Security System Design Web</description></item><item><title>Dumping Browser Cookies Chrome</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/dumping-browser-cookies-chrome/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/dumping-browser-cookies-chrome/</guid><description>Dumping Browser Cookies Chrome Dumping Browser Cookies Chrome - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Dumping Browser Cookies Firefox</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/dumping-browser-cookies-firefox/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/dumping-browser-cookies-firefox/</guid><description>Dumping Browser Cookies Firefox Dumping Browser Cookies Firefox - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Dumping Saved Logins Chrome</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/dumping-saved-logins-chrome/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/dumping-saved-logins-chrome/</guid><description>Dumping Saved Logins Chrome Dumping Saved Logins Chrome - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Dumping Saved Logins Firefox</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/dumping-saved-logins-firefox/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/dumping-saved-logins-firefox/</guid><description>Dumping Saved Logins Firefox Dumping Saved Logins Firefox - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Dumping the SAM Database</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/dumping-the-sam-database/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/dumping-the-sam-database/</guid><description>Dumping the SAM Database Dumping the SAM Database - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Dumping the SAM from Disk</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/dumping-the-sam-from-disk/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/dumping-the-sam-from-disk/</guid><description>Dumping the SAM from Disk Dumping the SAM from Disk - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Dumping the SAM Remotely</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/dumping-the-sam-remotely/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/dumping-the-sam-remotely/</guid><description>Dumping the SAM Remotely Dumping the SAM Remotely - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Dumpster Diving</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/physical-social-engineering/dumpster-diving/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/physical-social-engineering/dumpster-diving/</guid><description>Dumpster Diving Dumpster Diving - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Impersonation Techniques Lock Picking Pretexting</description></item><item><title>Dynamic Analysis</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/analysis-methods/dynamic-analysis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/analysis-methods/dynamic-analysis/</guid><description>Dynamic Analysis Dynamic Analysis - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Malware Analysis Techniques Static Analysis</description></item><item><title>Dynamic application security testing (DAST)</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/dynamic-application-security-testing-dast/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/dynamic-application-security-testing-dast/</guid><description>Dynamic application security testing (DAST) DAST - testing running applications by simulating attacks to find runtime vulnerabilities in a live environment.
Related Links: API Security Arachni Nikto Pipeline Security Shift Left Security Software composition analysis (SCA) Static application security testing (SAST) W3af</description></item><item><title>Dynamic Device Code Phishing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/dynamic-device-code-phishing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/dynamic-device-code-phishing/</guid><description>Dynamic Device Code Phishing Dynamic Device Code Phishing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Evilginx Phishlet Development Evilginx URL Rewriting GitHub Device Code Phishing GitLab Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Microsoft Device Code Phishing Protecting Evilginx Server via Caddy</description></item><item><title>Dynamic Programming</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/dynamic-programming/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/dynamic-programming/</guid><description>Dynamic Programming Dynamic Programming - optimization technique solving problems with overlapping subproblems using memoization or tabulation.
Related Links: Backtracking Big O Notation Bit Manipulation Divide and Conquer Graph Algorithms Greedy Algorithms Recursion Searching Sorting</description></item><item><title>Dynamic SQL</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/dynamic-sql/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/dynamic-sql/</guid><description>Dynamic SQL Dynamic SQL - SQL statements constructed and executed at runtime based on variable input conditions.
Related Links: Advanced SQL Aggregate queries Common table expressions (CTEs) Join queries Pivot and unpivot operations Recursive queries Select, insert, delete, update statements Stored procedures and triggers Subqueries Views Window functions</description></item><item><title>Ekko Sleep Obfuscation with Control Flow Guard</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/ekko-sleep-obfuscation-with-control-flow-guard/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/ekko-sleep-obfuscation-with-control-flow-guard/</guid><description>Ekko Sleep Obfuscation with Control Flow Guard Ekko Sleep Obfuscation with Control Flow Guard - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ekko Sleep Obfuscation with Restored File Section Protections Ekko Sleep Obfuscation with RtlEncryptMemory and RtlDecryptMemory Ekko Sleep Obfuscation with Stack Spoofing Heap Encryption with Ekko Sleep Obfuscation Introduction to Ekko Sleep Obfuscation Introduction to Foliage Sleep Obfuscation Introduction to Sleep Obfuscation PEfluctuation Zilean Sleep Obfuscation with Stack Duplication</description></item><item><title>Ekko Sleep Obfuscation with Restored File Section Protections</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/ekko-sleep-obfuscation-with-restored-file-section-protections/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/ekko-sleep-obfuscation-with-restored-file-section-protections/</guid><description>Ekko Sleep Obfuscation with Restored File Section Protections Ekko Sleep Obfuscation with Restored File Section Protections - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ekko Sleep Obfuscation with Control Flow Guard Ekko Sleep Obfuscation with RtlEncryptMemory and RtlDecryptMemory Ekko Sleep Obfuscation with Stack Spoofing Heap Encryption with Ekko Sleep Obfuscation Introduction to Ekko Sleep Obfuscation Introduction to Foliage Sleep Obfuscation Introduction to Sleep Obfuscation PEfluctuation Zilean Sleep Obfuscation with Stack Duplication</description></item><item><title>Ekko Sleep Obfuscation with RtlEncryptMemory and RtlDecryptMemory</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/ekko-sleep-obfuscation-with-rtlencryptmemory-and-rtldecryptmemory/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/ekko-sleep-obfuscation-with-rtlencryptmemory-and-rtldecryptmemory/</guid><description>Ekko Sleep Obfuscation with RtlEncryptMemory and RtlDecryptMemory Ekko Sleep Obfuscation with RtlEncryptMemory and RtlDecryptMemory - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ekko Sleep Obfuscation with Control Flow Guard Ekko Sleep Obfuscation with Restored File Section Protections Ekko Sleep Obfuscation with Stack Spoofing Heap Encryption with Ekko Sleep Obfuscation Introduction to Ekko Sleep Obfuscation Introduction to Foliage Sleep Obfuscation Introduction to Sleep Obfuscation PEfluctuation Zilean Sleep Obfuscation with Stack Duplication</description></item><item><title>Ekko Sleep Obfuscation with Stack Spoofing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/ekko-sleep-obfuscation-with-stack-spoofing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/ekko-sleep-obfuscation-with-stack-spoofing/</guid><description>Ekko Sleep Obfuscation with Stack Spoofing Ekko Sleep Obfuscation with Stack Spoofing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ekko Sleep Obfuscation with Control Flow Guard Ekko Sleep Obfuscation with Restored File Section Protections Ekko Sleep Obfuscation with RtlEncryptMemory and RtlDecryptMemory Heap Encryption with Ekko Sleep Obfuscation Introduction to Ekko Sleep Obfuscation Introduction to Foliage Sleep Obfuscation Introduction to Sleep Obfuscation PEfluctuation Zilean Sleep Obfuscation with Stack Duplication</description></item><item><title>Elasticsearch</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/elasticsearch/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/elasticsearch/</guid><description>Elasticsearch Elasticsearch - distributed search and analytics engine built on Apache Lucene for full-text search.
Related Links: Column dbs Document dbs Graphdbs Key value Memcached Non-relational databases NoSQL databases Redis Relational databases Search engines Solr Time series dbs Vector databases</description></item><item><title>Elevate Process to SYSTEM</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/elevate-process-to-system/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/elevate-process-to-system/</guid><description>Elevate Process to SYSTEM Elevate Process to SYSTEM - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item><item><title>Elevate Process to SYSTEM Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/elevate-process-to-system-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/elevate-process-to-system-kernel/</guid><description>Elevate Process to SYSTEM Kernel Elevate Process to SYSTEM Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>ELF File Format, Symbols, Sections, and Segments</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/elf-file-format-symbols-sections-and-segments/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/elf-file-format-symbols-sections-and-segments/</guid><description>ELF File Format, Symbols, Sections, and Segments ELF File Format, Symbols, Sections, and Segments - structure of ELF binaries produced by the toolchain, including .text, .data, .bss sections and symbol table layout.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Email Attachments and Phishing Campaigns</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/email-attachments-and-phishing-campaigns/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/email-attachments-and-phishing-campaigns/</guid><description>Email Attachments and Phishing Campaigns Email Attachments and Phishing Campaigns - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AitM and MFA Bypass Anti-Bot HTML Smuggling Infrastructure Introduction to Phishing Page Design and Delivery Phishing Anti-Analysis Phishing Requirements</description></item><item><title>Embedded Systems</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/</guid><description>Embedded Systems Map Embedded Systems - design, development, and maintenance of specialized computing systems that are integrated into larger devices or systems to perform specific functions.
Architectures C Language Communication Protocols Execution Models Exploits Hardware Runtime View STM32 Microcontrollers Related Links: Backend Engineering Cybersecurity DevOps and Platform Engineering Home</description></item><item><title>Embedded Systems Architectures</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/</guid><description>Embedded Systems Architectures Embedded Systems Architectures - the different approaches to designing and structuring embedded systems, including single-core, multi-core, and heterogeneous architectures.
Arm M-profile Bus Fabrics and On-Chip Interconnects CPU Core Concepts Heterogeneous SoCs and Co-processors Memory Architecture Power and Clock Domain Architecture RISC-V Single-Core vs Multi-Core Architectures Related Links: C Language for Embedded Systems Embedded Systems Communication Protocols Embedded Systems Execution Models Embedded Systems Exploits Embedded Systems Hardware Embedded Systems Runtime View STM32 Microcontrollers</description></item><item><title>Embedded Systems Communication Protocols</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/</guid><description>Embedded Systems Communication Protocols Embedded Systems Communication Protocols - the methods and standards used for communication between embedded systems and other devices or systems.
CAN Bus I2C Monodon Firmware SPI UART Related Links: C Language for Embedded Systems Embedded Systems Architectures Embedded Systems Execution Models Embedded Systems Exploits Embedded Systems Hardware Embedded Systems Runtime View STM32 Microcontrollers</description></item><item><title>Embedded Systems Execution Models</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/</guid><description>Embedded Systems Execution Models Embedded Systems Execution Models - the different approaches to managing and executing code in embedded systems, including polling, interrupt-driven, and real-time operating system (RTOS) based models.
Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling Related Links: C Language for Embedded Systems Embedded Systems Architectures Embedded Systems Communication Protocols Embedded Systems Exploits Embedded Systems Hardware Embedded Systems Runtime View STM32 Microcontrollers</description></item><item><title>Embedded Systems Exploits</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/</guid><description>Embedded Systems Exploits Embedded Systems Exploits - the methods and techniques used to identify and exploit vulnerabilities in embedded systems.
Buffer Overflow Firmware Exploitation Network Attacks Physical Attacks Side-Channel Attacks Related Links: C Language for Embedded Systems Embedded Systems Architectures Embedded Systems Communication Protocols Embedded Systems Execution Models Embedded Systems Hardware Embedded Systems Runtime View STM32 Microcontrollers</description></item><item><title>Embedded Systems Hardware</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/</guid><description>Embedded Systems Hardware Embedded Systems Hardware - the physical components and architecture of embedded systems, including microcontrollers, memory, and peripheral devices.
Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting Related Links: C Language for Embedded Systems Embedded Systems Architectures Embedded Systems Communication Protocols Embedded Systems Execution Models Embedded Systems Exploits Embedded Systems Runtime View STM32 Microcontrollers</description></item><item><title>Embeddings</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/ai-and-llms/embeddings/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/ai-and-llms/embeddings/</guid><description>Embeddings Embeddings - dense vector representations of data used for semantic search and AI tasks.
Related Links: Ai in development Function calling RAGs Structured outputs</description></item><item><title>Enable Disable RDP</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/enable-disable-rdp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/enable-disable-rdp/</guid><description>Enable Disable RDP Enable Disable RDP - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Enable Disable Restricted Admin</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/enable-disable-restricted-admin/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/enable-disable-restricted-admin/</guid><description>Enable Disable Restricted Admin Enable Disable Restricted Admin - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Enable Remote Desktop via Registry</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/enable-remote-desktop-via-registry/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/enable-remote-desktop-via-registry/</guid><description>Enable Remote Desktop via Registry Enable Remote Desktop via Registry - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Enable SeDebugPrivilege</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/enable-sedebugprivilege/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/enable-sedebugprivilege/</guid><description>Enable SeDebugPrivilege Enable SeDebugPrivilege - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Enable SeDebugPrivilege Exploitation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/enable-sedebugprivilege-exploitation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/enable-sedebugprivilege-exploitation/</guid><description>Enable SeDebugPrivilege Exploitation Enable SeDebugPrivilege Exploitation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item><item><title>Enable WDigest</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/enable-wdigest/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/enable-wdigest/</guid><description>Enable WDigest Enable WDigest - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Enable WDigest for Credential Capture</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/enable-wdigest-for-credential-capture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/enable-wdigest-for-credential-capture/</guid><description>Enable WDigest for Credential Capture Enable WDigest for Credential Capture - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item><item><title>Encryption</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/</guid><description>Encryption Encryption - the process of encoding data using cryptographic algorithms so that only authorized parties can decode and read it.
AES Base N Encoder Entropy Reduction Brute Forcing Key Decryption Caesar Cipher Encryption Decryption ChaCha20 Encryption Algorithm Data Encryption Techniques Encryption Fundamentals Generating Encryption Keys Without WinAPI Calls Random Key Generation RC4 SystemFunction040 Encryption Decryption XOR Encryption Decryption via Multi-Byte Key XOR Encryption Decryption via Single Byte Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Encryption and Packing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/encryption-and-packing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/encryption-and-packing/</guid><description>Encryption and Packing Encryption and Packing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Encryption and Packing Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/encryption-and-packing-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/encryption-and-packing-techniques/</guid><description>Encryption and Packing Techniques Encryption and Packing Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Encryption Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/encryption-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/encryption-fundamentals/</guid><description>Encryption Fundamentals Encryption Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Base N Encoder Entropy Reduction Brute Forcing Key Decryption Caesar Cipher Encryption Decryption ChaCha20 Encryption Algorithm Data Encryption Techniques Generating Encryption Keys Without WinAPI Calls Random Key Generation RC4 SystemFunction040 Encryption Decryption XOR Encryption Decryption via Multi-Byte Key XOR Encryption Decryption via Single Byte</description></item><item><title>Endpoint Security</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/endpoint-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/endpoint-security/</guid><description>Endpoint Security Endpoint Security - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Detection Engineering SIEM and Tools SOC Honeypots Threat Hunting Techniques</description></item><item><title>Enumerate A Domain Groups Members</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-a-domain-groups-members/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-a-domain-groups-members/</guid><description>Enumerate A Domain Groups Members Enumerate A Domain Groups Members - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Accounts with Password Never Expiring</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-accounts-with-password-never-expiring/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-accounts-with-password-never-expiring/</guid><description>Enumerate Accounts with Password Never Expiring Enumerate Accounts with Password Never Expiring - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Aliases MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-aliases-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-aliases-ms-samr/</guid><description>Enumerate Aliases MS-SAMR Enumerate Aliases MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate All Groups in the Domain</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-all-groups-in-the-domain/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-all-groups-in-the-domain/</guid><description>Enumerate All Groups in the Domain Enumerate All Groups in the Domain - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate AS-REP Roastable Accounts</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-as-rep-roastable-accounts/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-as-rep-roastable-accounts/</guid><description>Enumerate AS-REP Roastable Accounts Enumerate AS-REP Roastable Accounts - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Connections MS-SRVS</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-connections-ms-srvs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-connections-ms-srvs/</guid><description>Enumerate Connections MS-SRVS Enumerate Connections MS-SRVS - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Disabled User Accounts</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-disabled-user-accounts/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-disabled-user-accounts/</guid><description>Enumerate Disabled User Accounts Enumerate Disabled User Accounts - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Domain Admins Members</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-domain-admins-members/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-domain-admins-members/</guid><description>Enumerate Domain Admins Members Enumerate Domain Admins Members - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Domain Computers by Keyword</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-domain-computers-by-keyword/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-domain-computers-by-keyword/</guid><description>Enumerate Domain Computers by Keyword Enumerate Domain Computers by Keyword - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Domains MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-domains-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-domains-ms-samr/</guid><description>Enumerate Domains MS-SAMR Enumerate Domains MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Electron Fuses</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-electron-fuses/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-electron-fuses/</guid><description>Enumerate Electron Fuses Enumerate Electron Fuses - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Group Policy Objects (GPOs)</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-group-policy-objects-gpos/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-group-policy-objects-gpos/</guid><description>Enumerate Group Policy Objects (GPOs) Enumerate Group Policy Objects (GPOs) - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Groups MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-groups-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-groups-ms-samr/</guid><description>Enumerate Groups MS-SAMR Enumerate Groups MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Locked Out User Accounts</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-locked-out-user-accounts/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-locked-out-user-accounts/</guid><description>Enumerate Locked Out User Accounts Enumerate Locked Out User Accounts - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Logged On Users Level 0 MS-WKST</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-logged-on-users-level-0-ms-wkst/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-logged-on-users-level-0-ms-wkst/</guid><description>Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 0 MS-WKST - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Logged On Users Level 1 MS-WKST</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-logged-on-users-level-1-ms-wkst/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-logged-on-users-level-1-ms-wkst/</guid><description>Enumerate Logged On Users Level 1 MS-WKST Enumerate Logged On Users Level 1 MS-WKST - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate LSAD Accounts MS-LSAD</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-lsad-accounts-ms-lsad/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-lsad-accounts-ms-lsad/</guid><description>Enumerate LSAD Accounts MS-LSAD Enumerate LSAD Accounts MS-LSAD - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Must Change Password Accounts</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-must-change-password-accounts/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-must-change-password-accounts/</guid><description>Enumerate Must Change Password Accounts Enumerate Must Change Password Accounts - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate NetBIOS Names</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-netbios-names/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-netbios-names/</guid><description>Enumerate NetBIOS Names Enumerate NetBIOS Names - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Organizational Units (OUs)</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-organizational-units-ous/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-organizational-units-ous/</guid><description>Enumerate Organizational Units (OUs) Enumerate Organizational Units (OUs) - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Process Memory Maps</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-process-memory-maps/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-process-memory-maps/</guid><description>Enumerate Process Memory Maps Enumerate Process Memory Maps - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Protected Admin Users</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-protected-admin-users/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-protected-admin-users/</guid><description>Enumerate Protected Admin Users Enumerate Protected Admin Users - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Remote Host</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-remote-host/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-remote-host/</guid><description>Enumerate Remote Host Enumerate Remote Host - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate RPC Interfaces C706-MGMT</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-rpc-interfaces-c706-mgmt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-rpc-interfaces-c706-mgmt/</guid><description>Enumerate RPC Interfaces C706-MGMT Enumerate RPC Interfaces C706-MGMT - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate System Privileges MS-LSAD</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-system-privileges-ms-lsad/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-system-privileges-ms-lsad/</guid><description>Enumerate System Privileges MS-LSAD Enumerate System Privileges MS-LSAD - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate User Service Accounts SPN</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-user-service-accounts-spn/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-user-service-accounts-spn/</guid><description>Enumerate User Service Accounts SPN Enumerate User Service Accounts SPN - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate UserPassword Attribute</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-userpassword-attribute/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-userpassword-attribute/</guid><description>Enumerate UserPassword Attribute Enumerate UserPassword Attribute - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Users MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-users-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-users-ms-samr/</guid><description>Enumerate Users MS-SAMR Enumerate Users MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Users Requiring Smartcard for Logon</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-users-requiring-smartcard-for-logon/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-users-requiring-smartcard-for-logon/</guid><description>Enumerate Users Requiring Smartcard for Logon Enumerate Users Requiring Smartcard for Logon - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Users Who Never Logged In</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-users-who-never-logged-in/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-users-who-never-logged-in/</guid><description>Enumerate Users Who Never Logged In Enumerate Users Who Never Logged In - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Users with Password Never Expiring</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-users-with-password-never-expiring/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-users-with-password-never-expiring/</guid><description>Enumerate Users with Password Never Expiring Enumerate Users with Password Never Expiring - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Users with Password Not Required</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-users-with-password-not-required/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-users-with-password-not-required/</guid><description>Enumerate Users with Password Not Required Enumerate Users with Password Not Required - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Users with Reversible Encryption Enabled</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-users-with-reversible-encryption-enabled/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-users-with-reversible-encryption-enabled/</guid><description>Enumerate Users with Reversible Encryption Enabled Enumerate Users with Reversible Encryption Enabled - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Enumerate Workstation Transports Level 0 MS-WKST</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-workstation-transports-level-0-ms-wkst/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/enumerate-workstation-transports-level-0-ms-wkst/</guid><description>Enumerate Workstation Transports Level 0 MS-WKST Enumerate Workstation Transports Level 0 MS-WKST - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>ETW Bypass</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/</guid><description>ETW Bypass ETW Bypass - techniques for disabling or subverting Event Tracing for Windows to prevent telemetry collection by EDR and monitoring tools.
ETW Bypass Byte Patching ETW Bypass Improved Patching ETW Discovering ETW Tools ETW Evasion ETW Evasion via NtTraceEvent Patching ETW Evasion via Patching ETW Evasion via Patching EtwpEventWrite ETW Evasion via Patching EtwpEventWrite v2 ETW Evasion via WinAPIs Patching ETW Provider Session Hijacking Introduction to ETW Patchless ETW Bypass via Hardware Breakpoints Related Links: AMSI Bypass Anti-Analysis Automated Obfuscation Techniques Code Obfuscation Covering Tracks NTDLL Unhooking and API Hooking</description></item><item><title>ETW Bypass Byte Patching</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-bypass-byte-patching/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-bypass-byte-patching/</guid><description>ETW Bypass Byte Patching ETW Bypass Byte Patching - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ETW Bypass Improved Patching ETW Discovering ETW Tools ETW Evasion ETW Evasion via NtTraceEvent Patching ETW Evasion via Patching ETW Evasion via Patching EtwpEventWrite ETW Evasion via Patching EtwpEventWrite v2 ETW Evasion via WinAPIs Patching ETW Provider Session Hijacking Introduction to ETW Patchless ETW Bypass via Hardware Breakpoints</description></item><item><title>ETW Bypass Improved Patching</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-bypass-improved-patching/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-bypass-improved-patching/</guid><description>ETW Bypass Improved Patching ETW Bypass Improved Patching - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ETW Bypass Byte Patching ETW Discovering ETW Tools ETW Evasion ETW Evasion via NtTraceEvent Patching ETW Evasion via Patching ETW Evasion via Patching EtwpEventWrite ETW Evasion via Patching EtwpEventWrite v2 ETW Evasion via WinAPIs Patching ETW Provider Session Hijacking Introduction to ETW Patchless ETW Bypass via Hardware Breakpoints</description></item><item><title>ETW Discovering ETW Tools</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-discovering-etw-tools/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-discovering-etw-tools/</guid><description>ETW Discovering ETW Tools ETW Discovering ETW Tools - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ETW Bypass Byte Patching ETW Bypass Improved Patching ETW Evasion ETW Evasion via NtTraceEvent Patching ETW Evasion via Patching ETW Evasion via Patching EtwpEventWrite ETW Evasion via Patching EtwpEventWrite v2 ETW Evasion via WinAPIs Patching ETW Provider Session Hijacking Introduction to ETW Patchless ETW Bypass via Hardware Breakpoints</description></item><item><title>ETW Evasion</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-evasion/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-evasion/</guid><description>ETW Evasion ETW Evasion - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ETW Bypass Byte Patching ETW Bypass Improved Patching ETW Discovering ETW Tools ETW Evasion via NtTraceEvent Patching ETW Evasion via Patching ETW Evasion via Patching EtwpEventWrite ETW Evasion via Patching EtwpEventWrite v2 ETW Evasion via WinAPIs Patching ETW Provider Session Hijacking Introduction to ETW Patchless ETW Bypass via Hardware Breakpoints</description></item><item><title>ETW Evasion via NtTraceEvent Patching</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-evasion-via-nttraceevent-patching/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-evasion-via-nttraceevent-patching/</guid><description>ETW Evasion via NtTraceEvent Patching ETW Evasion via NtTraceEvent Patching - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ETW Bypass Byte Patching ETW Bypass Improved Patching ETW Discovering ETW Tools ETW Evasion ETW Evasion via Patching ETW Evasion via Patching EtwpEventWrite ETW Evasion via Patching EtwpEventWrite v2 ETW Evasion via WinAPIs Patching ETW Provider Session Hijacking Introduction to ETW Patchless ETW Bypass via Hardware Breakpoints</description></item><item><title>ETW Evasion via Patching</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-evasion-via-patching/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-evasion-via-patching/</guid><description>ETW Evasion via Patching ETW Evasion via Patching - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ETW Bypass Byte Patching ETW Bypass Improved Patching ETW Discovering ETW Tools ETW Evasion ETW Evasion via NtTraceEvent Patching ETW Evasion via Patching EtwpEventWrite ETW Evasion via Patching EtwpEventWrite v2 ETW Evasion via WinAPIs Patching ETW Provider Session Hijacking Introduction to ETW Patchless ETW Bypass via Hardware Breakpoints</description></item><item><title>ETW Evasion via Patching EtwpEventWrite</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-evasion-via-patching-etwpeventwrite/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-evasion-via-patching-etwpeventwrite/</guid><description>ETW Evasion via Patching EtwpEventWrite ETW Evasion via Patching EtwpEventWrite - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ETW Bypass Byte Patching ETW Bypass Improved Patching ETW Discovering ETW Tools ETW Evasion ETW Evasion via NtTraceEvent Patching ETW Evasion via Patching ETW Evasion via Patching EtwpEventWrite v2 ETW Evasion via WinAPIs Patching ETW Provider Session Hijacking Introduction to ETW Patchless ETW Bypass via Hardware Breakpoints</description></item><item><title>ETW Evasion via Patching EtwpEventWrite v2</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-evasion-via-patching-etwpeventwrite-v2/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-evasion-via-patching-etwpeventwrite-v2/</guid><description>ETW Evasion via Patching EtwpEventWrite v2 ETW Evasion via Patching EtwpEventWrite v2 - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ETW Bypass Byte Patching ETW Bypass Improved Patching ETW Discovering ETW Tools ETW Evasion ETW Evasion via NtTraceEvent Patching ETW Evasion via Patching ETW Evasion via Patching EtwpEventWrite ETW Evasion via WinAPIs Patching ETW Provider Session Hijacking Introduction to ETW Patchless ETW Bypass via Hardware Breakpoints</description></item><item><title>ETW Evasion via WinAPIs Patching</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-evasion-via-winapis-patching/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-evasion-via-winapis-patching/</guid><description>ETW Evasion via WinAPIs Patching ETW Evasion via WinAPIs Patching - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ETW Bypass Byte Patching ETW Bypass Improved Patching ETW Discovering ETW Tools ETW Evasion ETW Evasion via NtTraceEvent Patching ETW Evasion via Patching ETW Evasion via Patching EtwpEventWrite ETW Evasion via Patching EtwpEventWrite v2 ETW Provider Session Hijacking Introduction to ETW Patchless ETW Bypass via Hardware Breakpoints</description></item><item><title>ETW Provider Session Hijacking</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-provider-session-hijacking/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/etw-provider-session-hijacking/</guid><description>ETW Provider Session Hijacking ETW Provider Session Hijacking - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ETW Bypass Byte Patching ETW Bypass Improved Patching ETW Discovering ETW Tools ETW Evasion ETW Evasion via NtTraceEvent Patching ETW Evasion via Patching ETW Evasion via Patching EtwpEventWrite ETW Evasion via Patching EtwpEventWrite v2 ETW Evasion via WinAPIs Patching Introduction to ETW Patchless ETW Bypass via Hardware Breakpoints</description></item><item><title>Evading Google Safe Browsing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/evading-google-safe-browsing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/evading-google-safe-browsing/</guid><description>Evading Google Safe Browsing Evading Google Safe Browsing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Evasion with File Bloating</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/evasion-with-file-bloating/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/evasion-with-file-bloating/</guid><description>Evasion with File Bloating Evasion with File Bloating - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Event-Driven and State-Machine Models</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/event-driven-and-state-machine-models/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/event-driven-and-state-machine-models/</guid><description>Event-Driven and State-Machine Models Event-Driven and State-Machine Models - firmware architecture that transitions between well-defined states in response to hardware events or software signals.
Related Links: Cooperative Scheduling Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>Event-driven architecture</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/event-driven-architecture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/event-driven-architecture/</guid><description>Event-driven architecture Event-Driven Architecture - design pattern where components communicate through events for loose coupling.
Related Links: Backpressure Circuit breakers Failure modes Graceful degradation Loadshifting Rate limiting Real time data Realtime Server sent events short polling Streaming Throttling Websockets</description></item><item><title>Evil Twin Attacks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/evil-twin-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/evil-twin-attacks/</guid><description>Evil Twin Attacks Evil Twin Attacks - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Acoustic Communication Exploits Bluetooth Exploits Deauth Infrared Exploits Near-Field Communication (NFC) Exploits Power Line Communication Exploits Quantum Communication Exploits Radio Frequency Exploits Rogue Access Point Satellite Communication Exploits Ultrasonic Communication Exploits Visible Light Communication Exploits WiFi Exploits</description></item><item><title>Evilginx Phishlet Development</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/evilginx-phishlet-development/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/evilginx-phishlet-development/</guid><description>Evilginx Phishlet Development Evilginx Phishlet Development - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx URL Rewriting GitHub Device Code Phishing GitLab Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Microsoft Device Code Phishing Protecting Evilginx Server via Caddy</description></item><item><title>Evilginx URL Rewriting</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/evilginx-url-rewriting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/evilginx-url-rewriting/</guid><description>Evilginx URL Rewriting Evilginx URL Rewriting - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx Phishlet Development GitHub Device Code Phishing GitLab Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Microsoft Device Code Phishing Protecting Evilginx Server via Caddy</description></item><item><title>Exceptions</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/exceptions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/exceptions/</guid><description>Exceptions Exceptions - synchronous and asynchronous events on Cortex-M that transfer control to exception handlers, including faults, SVC calls, and system-level exceptions.
Related Links: Boot Flow on Cortex-M Interruptions MPU Usage Patterns NVIC TrustZone-M</description></item><item><title>Execute Shell Command</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/execute-shell-command/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/execute-shell-command/</guid><description>Execute Shell Command Execute Shell Command - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Executing Commands via IShellDispatch2 COM Interface</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/executing-commands-via-ishelldispatch2-com-interface/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/executing-commands-via-ishelldispatch2-com-interface/</guid><description>Executing Commands via IShellDispatch2 COM Interface Executing Commands via IShellDispatch2 COM Interface - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Executing Files via IHxHelpPaneServer COM Interface</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/executing-files-via-ihxhelppaneserver-com-interface/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/executing-files-via-ihxhelppaneserver-com-interface/</guid><description>Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxHelpPaneServer COM Interface - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Executing Files via IHxInteractiveUser COM Interface</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/executing-files-via-ihxinteractiveuser-com-interface/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/executing-files-via-ihxinteractiveuser-com-interface/</guid><description>Executing Files via IHxInteractiveUser COM Interface Executing Files via IHxInteractiveUser COM Interface - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Exploiting Cloud Infrastructure</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-cloud-infrastructure/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-cloud-infrastructure/</guid><description>Exploiting Cloud Infrastructure Exploiting Cloud Infrastructure - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Containerized Environments Exploiting Embedded Systems Exploiting Industrial Control Systems (ICS) Exploiting IoT Devices Exploiting Mobile Devices Exploiting Operational Technology (OT) Systems Exploiting Serverless Environments</description></item><item><title>Exploiting Containerized Environments</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-containerized-environments/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-containerized-environments/</guid><description>Exploiting Containerized Environments Exploiting Containerized Environments - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Cloud Infrastructure Exploiting Embedded Systems Exploiting Industrial Control Systems (ICS) Exploiting IoT Devices Exploiting Mobile Devices Exploiting Operational Technology (OT) Systems Exploiting Serverless Environments</description></item><item><title>Exploiting EDR for Evasion</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/exploiting-edr-for-evasion/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/exploiting-edr-for-evasion/</guid><description>Exploiting EDR for Evasion Exploiting EDR for Evasion - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Exploiting Embedded Systems</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-embedded-systems/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-embedded-systems/</guid><description>Exploiting Embedded Systems Exploiting Embedded Systems - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Cloud Infrastructure Exploiting Containerized Environments Exploiting Industrial Control Systems (ICS) Exploiting IoT Devices Exploiting Mobile Devices Exploiting Operational Technology (OT) Systems Exploiting Serverless Environments</description></item><item><title>Exploiting Industrial Control Systems (ICS)</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-industrial-control-systems-ics/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-industrial-control-systems-ics/</guid><description>Exploiting Industrial Control Systems (ICS) Exploiting Industrial Control Systems (ICS) - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Cloud Infrastructure Exploiting Containerized Environments Exploiting Embedded Systems Exploiting IoT Devices Exploiting Mobile Devices Exploiting Operational Technology (OT) Systems Exploiting Serverless Environments</description></item><item><title>Exploiting IoT Devices</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-iot-devices/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-iot-devices/</guid><description>Exploiting IoT Devices Exploiting IoT Devices - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Cloud Infrastructure Exploiting Containerized Environments Exploiting Embedded Systems Exploiting Industrial Control Systems (ICS) Exploiting Mobile Devices Exploiting Operational Technology (OT) Systems Exploiting Serverless Environments</description></item><item><title>Exploiting Mobile Devices</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-mobile-devices/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-mobile-devices/</guid><description>Exploiting Mobile Devices Exploiting Mobile Devices - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Cloud Infrastructure Exploiting Containerized Environments Exploiting Embedded Systems Exploiting Industrial Control Systems (ICS) Exploiting IoT Devices Exploiting Operational Technology (OT) Systems Exploiting Serverless Environments</description></item><item><title>Exploiting Operational Technology (OT) Systems</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-operational-technology-ot-systems/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-operational-technology-ot-systems/</guid><description>Exploiting Operational Technology (OT) Systems Exploiting Operational Technology (OT) Systems - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Cloud Infrastructure Exploiting Containerized Environments Exploiting Embedded Systems Exploiting Industrial Control Systems (ICS) Exploiting IoT Devices Exploiting Mobile Devices Exploiting Serverless Environments</description></item><item><title>Exploiting Serverless Environments</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-serverless-environments/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-serverless-environments/</guid><description>Exploiting Serverless Environments Exploiting Serverless Environments - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Cloud Infrastructure Exploiting Containerized Environments Exploiting Embedded Systems Exploiting Industrial Control Systems (ICS) Exploiting IoT Devices Exploiting Mobile Devices Exploiting Operational Technology (OT) Systems</description></item><item><title>Extract WiFi Passwords</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/extract-wifi-passwords/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/extract-wifi-passwords/</guid><description>Extract WiFi Passwords Extract WiFi Passwords - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Failure modes</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/failure-modes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/failure-modes/</guid><description>Failure modes Failure Modes - ways in which distributed systems can fail and strategies for handling each.
Related Links: Backpressure Circuit breakers Event-driven architecture Graceful degradation Loadshifting Rate limiting Real time data Realtime Server sent events short polling Streaming Throttling Websockets</description></item><item><title>Failure Recovery Models</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/failure-recovery-models/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/failure-recovery-models/</guid><description>Failure Recovery Models Failure Recovery Models - strategies for detecting and recovering from runtime errors, watchdog timeouts, and unexpected system states in embedded firmware.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>Fast and Slow Pointers</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/fast-and-slow-pointers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/fast-and-slow-pointers/</guid><description>Fast and Slow Pointers Fast and Slow Pointers - two-pointer technique for detecting cycles and finding midpoints in linked lists.
Related Links: BFS Pattern Binary Search Pattern DFS Pattern Merge Intervals Monotonic Stack Sliding Window Top K Elements Two Pointers Union Find</description></item><item><title>Fetch a Pointer to PEB</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/fetch-a-pointer-to-peb/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/fetch-a-pointer-to-peb/</guid><description>Fetch a Pointer to PEB Fetch a Pointer to PEB - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Fetch a Pointer to PEB ARM</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/fetch-a-pointer-to-peb-arm/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/fetch-a-pointer-to-peb-arm/</guid><description>Fetch a Pointer to PEB ARM Fetch a Pointer to PEB ARM - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Fetch a Pointer to TEB</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/fetch-a-pointer-to-teb/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/fetch-a-pointer-to-teb/</guid><description>Fetch a Pointer to TEB Fetch a Pointer to TEB - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Fetch Image DOS Header</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/fetch-image-dos-header/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/fetch-image-dos-header/</guid><description>Fetch Image DOS Header Fetch Image DOS Header - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Fetch Image Headers</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/fetch-image-headers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/fetch-image-headers/</guid><description>Fetch Image Headers Fetch Image Headers - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Fetch Image NT Headers</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/fetch-image-nt-headers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/fetch-image-nt-headers/</guid><description>Fetch Image NT Headers Fetch Image NT Headers - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Fetch Payload via URL</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/fetch-payload-via-url/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/fetch-payload-via-url/</guid><description>Fetch Payload via URL Fetch Payload via URL - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Fetch Payload via URL using IWinHttpRequest COM Interface</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/fetch-payload-via-url-using-iwinhttprequest-com-interface/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/fetch-payload-via-url-using-iwinhttprequest-com-interface/</guid><description>Fetch Payload via URL using IWinHttpRequest COM Interface Fetch Payload via URL using IWinHttpRequest COM Interface - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Fetching LSASS Handle and Bypassing PPL</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/fetching-lsass-handle-and-bypassing-ppl/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/fetching-lsass-handle-and-bypassing-ppl/</guid><description>Fetching LSASS Handle and Bypassing PPL Fetching LSASS Handle and Bypassing PPL - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>File Creation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/file-creation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/file-creation/</guid><description>File Creation File Creation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Active Directory Active Directory Enumeration Create Shortcut via IShellLink COM Interface File Operations Windows Administration Windows Exploitation Write File to Disk</description></item><item><title>File Entropy Reduction</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/file-entropy-reduction/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/file-entropy-reduction/</guid><description>File Entropy Reduction File Entropy Reduction - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>File Entropy Reduction Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/file-entropy-reduction-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/file-entropy-reduction-techniques/</guid><description>File Entropy Reduction Techniques File Entropy Reduction Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>File Operations</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/file-operations/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/file-operations/</guid><description>File Operations File Operations - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Active Directory Active Directory Enumeration Create Shortcut via IShellLink COM Interface File Creation Windows Administration Windows Exploitation Write File to Disk</description></item><item><title>File Sharing and Removable Media</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/digital-social-engineering/file-sharing-and-removable-media/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/digital-social-engineering/file-sharing-and-removable-media/</guid><description>File Sharing and Removable Media File Sharing and Removable Media - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Business Email Compromise Drive-By Downloads Phishing Overview Typo Squatting Watering Hole Attacks</description></item><item><title>File Time Stomping</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/file-time-stomping/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/file-time-stomping/</guid><description>File Time Stomping File Time Stomping - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Forensic Techniques Covering Tracks Techniques Data Destruction Techniques Log Tampering Techniques Self-Deletion Techniques Shadow Copy Deletion Timestomping Techniques</description></item><item><title>File Upload via SMB</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/file-upload-via-smb/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/file-upload-via-smb/</guid><description>File Upload via SMB File Upload via SMB - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Fileless Malware</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/fileless-malware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/fileless-malware/</guid><description>Fileless Malware Fileless Malware - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Firewall Configuration</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/server-administration/firewall-configuration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/server-administration/firewall-configuration/</guid><description>Firewall Configuration Firewall Configuration - configuring host-based and network firewalls to enforce least-privilege access and traffic filtering.
Related Links: Linux Security and Hardening Linux Server Administration SSH Windows Security and Hardening Windows Server Administration</description></item><item><title>Firewalls</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/</guid><description>Firewalls Firewalls - network security systems that monitor and control incoming and outgoing traffic based on predetermined security rules.
DMZ Firewalls Overview Honeypots Jump Server Microsegmentation Network Segmentation Port Blocking Zero Trust Architecture Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Firewalls Overview</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/firewalls-overview/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/firewalls-overview/</guid><description>Firewalls Overview Firewalls Overview - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DMZ Honeypots Jump Server Microsegmentation Network Segmentation Port Blocking Zero Trust Architecture</description></item><item><title>Firmware Exploitation</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/firmware-exploitation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/firmware-exploitation/</guid><description>Firmware Exploitation Firmware Exploitation - techniques for identifying and exploiting vulnerabilities in embedded firmware, including reverse engineering and binary patching.
Related Links: Buffer Overflow Network Attacks Physical Attacks Side-Channel Attacks</description></item><item><title>FNV1A String Hashing Algorithm</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/fnv1a-string-hashing-algorithm/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/fnv1a-string-hashing-algorithm/</guid><description>FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>FNV1A String Hashing Algorithm ASCII</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/fnv1a-string-hashing-algorithm-ascii/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/fnv1a-string-hashing-algorithm-ascii/</guid><description>FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Algorithm ASCII - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>FNV1A String Hashing Syscalls Hash Values</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/fnv1a-string-hashing-syscalls-hash-values/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/fnv1a-string-hashing-syscalls-hash-values/</guid><description>FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>FNV1A String Hashing Syscalls Hash Values NT</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/fnv1a-string-hashing-syscalls-hash-values-nt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/fnv1a-string-hashing-syscalls-hash-values-nt/</guid><description>FNV1A String Hashing Syscalls Hash Values NT FNV1A String Hashing Syscalls Hash Values NT - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>FNV1A Syscalls Hash Values ZW</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/fnv1a-syscalls-hash-values-zw/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/fnv1a-syscalls-hash-values-zw/</guid><description>FNV1A Syscalls Hash Values ZW FNV1A Syscalls Hash Values ZW - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>FNV1A WinAPIs Hash Values</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/fnv1a-winapis-hash-values/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/fnv1a-winapis-hash-values/</guid><description>FNV1A WinAPIs Hash Values FNV1A WinAPIs Hash Values - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Forensics</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/forensics/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/forensics/</guid><description>Forensics Forensics - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Forensic Techniques Automated Reverse Engineering Digital Forensics Hayabusa Incident Response Threat Hunting Techniques</description></item><item><title>Forms and Validation</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/forms-and-validation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/forms-and-validation/</guid><description>Forms and Validation Forms and Validation - defining HTML forms as Python classes with built-in field validation and error handling.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>Forwarded Functions</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/forwarded-functions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/forwarded-functions/</guid><description>Forwarded Functions Forwarded Functions - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Function calling</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/ai-and-llms/function-calling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/ai-and-llms/function-calling/</guid><description>Function calling Function Calling - LLM capability to invoke predefined functions based on natural language input.
Related Links: Ai in development Embeddings RAGs Structured outputs</description></item><item><title>Function Replacements</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/function-replacements/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/function-replacements/</guid><description>Function Replacements Function Replacements - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Function Replacements eg Malloc Strcpy ZeroMemory</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/function-replacements-eg-malloc-strcpy-zeromemory/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/function-replacements-eg-malloc-strcpy-zeromemory/</guid><description>Function Replacements eg Malloc Strcpy ZeroMemory Function Replacements eg Malloc Strcpy ZeroMemory - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Function Stomping</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/function-stomping/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/function-stomping/</guid><description>Function Stomping Function Stomping - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Function-Based Views</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/function-based-views/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/function-based-views/</guid><description>Function-Based Views Function-Based Views - request-handling functions that receive an HttpRequest object and return an HttpResponse.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>Functional testing</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/functional-testing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/functional-testing/</guid><description>Functional testing Functional Testing - verifying that software functions according to specified requirements.
Related Links: Code reviews Documentation generation Git Integration testing Refactoring Unit testing</description></item><item><title>Functions and Modular Firmware Design</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/functions-and-modular-firmware-design/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/functions-and-modular-firmware-design/</guid><description>Functions and Modular Firmware Design Functions and Modular Firmware Design - function declarations, calling conventions, stack usage, and techniques for organizing firmware into reusable modules.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Generating Encryption Keys Without WinAPI Calls</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/generating-encryption-keys-without-winapi-calls/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/generating-encryption-keys-without-winapi-calls/</guid><description>Generating Encryption Keys Without WinAPI Calls Generating Encryption Keys Without WinAPI Calls - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Base N Encoder Entropy Reduction Brute Forcing Key Decryption Caesar Cipher Encryption Decryption ChaCha20 Encryption Algorithm Data Encryption Techniques Encryption Fundamentals Random Key Generation RC4 SystemFunction040 Encryption Decryption XOR Encryption Decryption via Multi-Byte Key XOR Encryption Decryption via Single Byte</description></item><item><title>Get Current LSA User MS-LSAT</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/get-current-lsa-user-ms-lsat/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/get-current-lsa-user-ms-lsat/</guid><description>Get Current LSA User MS-LSAT Get Current LSA User MS-LSAT - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Get Current Token</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/get-current-token/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/get-current-token/</guid><description>Get Current Token Get Current Token - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Get Domain SID</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/get-domain-sid/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/get-domain-sid/</guid><description>Get Domain SID Get Domain SID - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Get Domain SID MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/get-domain-sid-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/get-domain-sid-ms-samr/</guid><description>Get Domain SID MS-SAMR Get Domain SID MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Get NTDLL Base Address from Stack Frame Walk</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/get-ntdll-base-address-from-stack-frame-walk/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/get-ntdll-base-address-from-stack-frame-walk/</guid><description>Get NTDLL Base Address from Stack Frame Walk Get NTDLL Base Address from Stack Frame Walk - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Get Payload from URL</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/get-payload-from-url/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/get-payload-from-url/</guid><description>Get Payload from URL Get Payload from URL - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Get Service Display Name MS-SCMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/get-service-display-name-ms-scmr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/get-service-display-name-ms-scmr/</guid><description>Get Service Display Name MS-SCMR Get Service Display Name MS-SCMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Get Username</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/get-username/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/get-username/</guid><description>Get Username Get Username - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Get Workstation Info Level 100 MS-WKST</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/get-workstation-info-level-100-ms-wkst/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/get-workstation-info-level-100-ms-wkst/</guid><description>Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 100 MS-WKST - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Get Workstation Info Level 101 MS-WKST</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/get-workstation-info-level-101-ms-wkst/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/get-workstation-info-level-101-ms-wkst/</guid><description>Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 101 MS-WKST - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Get Workstation Info Level 102 MS-WKST</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/get-workstation-info-level-102-ms-wkst/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/get-workstation-info-level-102-ms-wkst/</guid><description>Get Workstation Info Level 102 MS-WKST Get Workstation Info Level 102 MS-WKST - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>GetModuleHandle Replacement</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/getmodulehandle-replacement/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/getmodulehandle-replacement/</guid><description>GetModuleHandle Replacement GetModuleHandle Replacement - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>GetProcAddress Replacement</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/getprocaddress-replacement/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/getprocaddress-replacement/</guid><description>GetProcAddress Replacement GetProcAddress Replacement - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Ghidra</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/ghidra/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/ghidra/</guid><description>Ghidra Ghidra - a free and open-source reverse engineering tool suite developed by the NSA for analyzing compiled code across multiple platforms.
Ghidra Fundamentals Ghidra Scripting Reverse Engineering with Ghidra Static Analysis with Ghidra Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Ghidra Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/ghidra/ghidra-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/ghidra/ghidra-fundamentals/</guid><description>Ghidra Fundamentals Ghidra Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ghidra Scripting Reverse Engineering with Ghidra Static Analysis with Ghidra</description></item><item><title>Ghidra Scripting</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/ghidra/ghidra-scripting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/ghidra/ghidra-scripting/</guid><description>Ghidra Scripting Ghidra Scripting - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ghidra Fundamentals Reverse Engineering with Ghidra Static Analysis with Ghidra</description></item><item><title>Ghost Process Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/ghost-process-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/ghost-process-injection/</guid><description>Ghost Process Injection Ghost Process Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Ghostly Hollowing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/ghostly-hollowing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/ghostly-hollowing/</guid><description>Ghostly Hollowing Ghostly Hollowing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Git</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/git/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/git/</guid><description>Git Git - distributed version control system for tracking code changes and collaborating on projects.
Related Links: Code reviews Documentation generation Functional testing Integration testing Refactoring Unit testing</description></item><item><title>GitHub Device Code Phishing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/github-device-code-phishing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/github-device-code-phishing/</guid><description>GitHub Device Code Phishing GitHub Device Code Phishing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx Phishlet Development Evilginx URL Rewriting GitLab Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Microsoft Device Code Phishing Protecting Evilginx Server via Caddy</description></item><item><title>GitLab Device Code Phishing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/gitlab-device-code-phishing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/gitlab-device-code-phishing/</guid><description>GitLab Device Code Phishing GitLab Device Code Phishing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx Phishlet Development Evilginx URL Rewriting GitHub Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Microsoft Device Code Phishing Protecting Evilginx Server via Caddy</description></item><item><title>GoTo Functionality</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/goto-functionality/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/goto-functionality/</guid><description>GoTo Functionality GoTo Functionality - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Graceful degradation</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/graceful-degradation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/graceful-degradation/</guid><description>Graceful degradation Graceful Degradation - design approach maintaining partial functionality when parts of a system fail.
Related Links: Backpressure Circuit breakers Event-driven architecture Failure modes Loadshifting Rate limiting Real time data Realtime Server sent events short polling Streaming Throttling Websockets</description></item><item><title>Graph Algorithms</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/graph-algorithms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/graph-algorithms/</guid><description>Graph Algorithms Graph Algorithms - BFS, DFS, Dijkstra&amp;rsquo;s shortest path, topological sort, union-find, and minimum spanning trees.
Related Links: Backtracking Big O Notation Bit Manipulation Divide and Conquer Dynamic Programming Greedy Algorithms Recursion Searching Sorting</description></item><item><title>Graphdbs</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/graphdbs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/graphdbs/</guid><description>Graphdbs Graph Databases - databases using graph structures with nodes and edges to store and query relationships.
Related Links: Column dbs Document dbs Elasticsearch Key value Memcached Non-relational databases NoSQL databases Redis Relational databases Search engines Solr Time series dbs Vector databases</description></item><item><title>GraphQL</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/graphql/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/graphql/</guid><description>GraphQL GraphQL - query language for APIs allowing clients to request exactly the data they need.
Related Links: API API Design API styles GraphQL Fundamentals GRPC HTTP and API Fundamentals Open API Specification (OAS) REST REST API Design SOAP</description></item><item><title>GraphQL Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/graphql-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/graphql-fundamentals/</guid><description>GraphQL Fundamentals GraphQL Fundamentals - core concepts of GraphQL including schemas, resolvers, queries, and mutations.
Related Links: API API Design API styles GraphQL GRPC HTTP and API Fundamentals Open API Specification (OAS) REST REST API Design SOAP</description></item><item><title>Graphs</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/graphs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/graphs/</guid><description>Graphs Graphs - collections of nodes connected by edges, represented as adjacency lists or matrices in Python.
Related Links: Arrays Binary Search Trees Hash Tables Heaps Linked Lists Queues Sets Stacks Strings Trees Tries</description></item><item><title>Greedy Algorithms</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/greedy-algorithms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/greedy-algorithms/</guid><description>Greedy Algorithms Greedy Algorithms - approach making locally optimal choices at each step to reach a globally optimal solution.
Related Links: Backtracking Big O Notation Bit Manipulation Divide and Conquer Dynamic Programming Graph Algorithms Recursion Searching Sorting</description></item><item><title>Group Administration</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/group-administration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/group-administration/</guid><description>Group Administration Group Administration - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Active Directory Fundamentals IAM Policies Identity and Access Management Fundamentals Identity Federation Pass the Hash Privileged Access Management User Administration</description></item><item><title>GRPC</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/grpc/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/grpc/</guid><description>GRPC gRPC - high-performance open-source RPC framework using HTTP/2 and Protocol Buffers for communication.
Related Links: API API Design API styles GraphQL GraphQL Fundamentals HTTP and API Fundamentals Open API Specification (OAS) REST REST API Design SOAP</description></item><item><title>Hack the Box Writeups</title><link>https://r0tbyt3.dev/wiki/labs/hackthebox/hackthebox/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/hackthebox/hackthebox/</guid><description>Hack the Box Writeups NOTICE: In order to maintain the integrity of the Hack the Box platform, this webpage only contains writeups for retired machines or specific, designated Pro Labs. Additionally, writeups do not contain any flags.
Hack the Box - a platform for learning and practicing cybersecurity skills through real-world challenges and exercises.
Hack the Box writeups and solutions.
Active Directory Exploitation AI and ML Exploitation Binary Exploitation Hardware Exploitation Reverse Engineering Related Links: Try Hack Me RingZer0 CTF</description></item><item><title>Handshakes</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-protocols/handshakes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-protocols/handshakes/</guid><description>Handshakes Handshakes - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS HTTPS Networking Networking Fundamentals Subnetting</description></item><item><title>Hardware Breakpoint Hooking Library</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/hardware-breakpoint-hooking-library/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/hardware-breakpoint-hooking-library/</guid><description>Hardware Breakpoint Hooking Library Hardware Breakpoint Hooking Library - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Hardware Breakpoint Threadless Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/hardware-breakpoint-threadless-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/hardware-breakpoint-threadless-injection/</guid><description>Hardware Breakpoint Threadless Injection Hardware Breakpoint Threadless Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Hardware Hooks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/hardware-hooks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/hardware-hooks/</guid><description>Hardware Hooks Hardware Hooks - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Variants NTDLL Unhooking NTDLL Unhooking Variants Unhooking All DLLs Utilizing Hardware Breakpoints for Hooking 1 Utilizing Hardware Breakpoints for Hooking 2</description></item><item><title>Harvard</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/memory-architecture/harvard/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/memory-architecture/harvard/</guid><description>Harvard Harvard - a processor memory architecture that uses separate buses for instruction and data memory, enabling simultaneous fetches and improving throughput in embedded applications.
Related Links: Von Neumann</description></item><item><title>Hash Tables</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/hash-tables/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/hash-tables/</guid><description>Hash Tables Hash Tables - key-value store with O(1) average lookup, insert, and delete, implemented with Python dict and set.
Related Links: Arrays Binary Search Trees Graphs Heaps Linked Lists Queues Sets Stacks Strings Trees Tries</description></item><item><title>Hashing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/hashing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/hashing/</guid><description>Hashing Hashing - the transformation of arbitrary data into a fixed-size digest using one-way cryptographic functions for integrity verification and storage.
CRC DJB2 Lose Lose Hashing Algorithms Hashing Fundamentals Multiple Hashing Algorithms Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Hashing algorithms</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/hashing-algorithms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/hashing-algorithms/</guid><description>Hashing algorithms Hashing Algorithms - functions mapping data of arbitrary size to fixed-size values for integrity and security.
Related Links: Argon2 Bcrypt MD5 Scrypt SHA-1 SHA-256 TLS</description></item><item><title>Hashing Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/hashing/hashing-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/hashing/hashing-fundamentals/</guid><description>Hashing Fundamentals Hashing Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: CRC DJB2 Lose Lose Hashing Algorithms Multiple Hashing Algorithms</description></item><item><title>Hayabusa</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/hayabusa/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/hayabusa/</guid><description>Hayabusa Hayabusa - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Forensic Techniques Automated Reverse Engineering Digital Forensics Forensics Incident Response Threat Hunting Techniques</description></item><item><title>Hayabusa</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/hayabusa/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/hayabusa/</guid><description>Hayabusa Hayabusa - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Maltego SIEM Fundamentals Splunk</description></item><item><title>Heap Encryption with Ekko Sleep Obfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/heap-encryption-with-ekko-sleep-obfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/heap-encryption-with-ekko-sleep-obfuscation/</guid><description>Heap Encryption with Ekko Sleep Obfuscation Heap Encryption with Ekko Sleep Obfuscation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ekko Sleep Obfuscation with Control Flow Guard Ekko Sleep Obfuscation with Restored File Section Protections Ekko Sleep Obfuscation with RtlEncryptMemory and RtlDecryptMemory Ekko Sleep Obfuscation with Stack Spoofing Introduction to Ekko Sleep Obfuscation Introduction to Foliage Sleep Obfuscation Introduction to Sleep Obfuscation PEfluctuation Zilean Sleep Obfuscation with Stack Duplication</description></item><item><title>Heaps</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/heaps/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/heaps/</guid><description>Heaps Heaps - complete binary trees satisfying the heap property, implemented with Python&amp;rsquo;s heapq module for priority queues.
Related Links: Arrays Binary Search Trees Graphs Hash Tables Linked Lists Queues Sets Stacks Strings Trees Tries</description></item><item><title>Hellshall</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/hellshall/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/hellshall/</guid><description>Hellshall Hellshall - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Herpaderping Hollowing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/herpaderping-hollowing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/herpaderping-hollowing/</guid><description>Herpaderping Hollowing Herpaderping Hollowing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Herpaderping Process Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/herpaderping-process-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/herpaderping-process-injection/</guid><description>Herpaderping Process Injection Herpaderping Process Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Heterogeneous SoCs and Co-processors</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/heterogeneous-socs-and-co-processors/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/heterogeneous-socs-and-co-processors/</guid><description>Heterogeneous SoCs and Co-processors Heterogeneous SoCs and Co-processors - system-on-chip designs that integrate multiple processor types (such as Cortex-M and Cortex-A), DSPs, or hardware accelerators to balance performance and power efficiency.
Related Links: Arm M-profile Bus Fabrics and On-Chip Interconnects CPU Core Concepts Memory Architecture Power and Clock Domain Architecture RISC-V Single Core vs Multi-Core Architectures</description></item><item><title>Hide Console Window</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/hide-console-window/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/hide-console-window/</guid><description>Hide Console Window Hide Console Window - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Hide Process Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/hide-process-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/hide-process-kernel/</guid><description>Hide Process Kernel Hide Process Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Hide Process Kernel Internals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/hide-process-kernel-internals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/hide-process-kernel-internals/</guid><description>Hide Process Kernel Internals Hide Process Kernel Internals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Hide Thread Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/hide-thread-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/hide-thread-kernel/</guid><description>Hide Thread Kernel Hide Thread Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Hide Thread Kernel Internals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/hide-thread-kernel-internals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/hide-thread-kernel-internals/</guid><description>Hide Thread Kernel Internals Hide Thread Kernel Internals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Hiding Domain via Referrer Policy</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/hiding-domain-via-referrer-policy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/hiding-domain-via-referrer-policy/</guid><description>Hiding Domain via Referrer Policy Hiding Domain via Referrer Policy - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Phishing Detection Methods Practical Phishing Detection Examples</description></item><item><title>Home</title><link>https://r0tbyt3.dev/wiki/content/home/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/home/</guid><description>Computer Science and Cybersecurity wiki on various topics, domains, tools, and playbooks. Have fun exploring and learning!
Backend Engineering Cybersecurity DevOps and Platform Engineering Embedded Systems</description></item><item><title>Honeypots</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/honeypots/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/honeypots/</guid><description>Honeypots Honeypots - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DMZ Firewalls Overview Jump Server Microsegmentation Network Segmentation Port Blocking Zero Trust Architecture</description></item><item><title>Host Check</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/host-check/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/host-check/</guid><description>Host Check Host Check - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Lookup ICMP Echo Network Attacks Network Evasion Techniques Network Protocols Port Scanning TCP Port Scan VPNs Wireless and Physical Attacks</description></item><item><title>Host Forensics Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/digital-forensics/host-forensics-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/digital-forensics/host-forensics-fundamentals/</guid><description>Host Forensics Fundamentals Host Forensics Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Disk Forensics Memory Forensics</description></item><item><title>Hostname Verification</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/hostname-verification/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/hostname-verification/</guid><description>Hostname Verification Hostname Verification - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>HTML Smuggling</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/</guid><description>HTML Smuggling HTML Smuggling - techniques for delivering malicious payloads by encoding them within HTML and JavaScript to bypass email and web content filters.
Analyzing and Evading SmuggleShield HTML Smuggling HTML Smuggling Strategies Integrating Anti-Bot with HTML Smuggling MOTW Bypass via FileFix Variations SVG Smuggling WebAssembly Smuggling Related Links: AitM and MFA Bypass Anti-Bot Email Attachments and Phishing Campaigns Infrastructure Introduction to Phishing Page Design and Delivery Phishing Anti-Analysis Phishing Requirements</description></item><item><title>HTML Smuggling</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/html-smuggling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/html-smuggling/</guid><description>HTML Smuggling HTML Smuggling - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing and Evading SmuggleShield HTML Smuggling Strategies Integrating Anti-Bot with HTML Smuggling MOTW Bypass via FileFix Variations SVG Smuggling WebAssembly Smuggling</description></item><item><title>HTML Smuggling Strategies</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/html-smuggling-strategies/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/html-smuggling-strategies/</guid><description>HTML Smuggling Strategies HTML Smuggling Strategies - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing and Evading SmuggleShield HTML Smuggling Integrating Anti-Bot with HTML Smuggling MOTW Bypass via FileFix Variations SVG Smuggling WebAssembly Smuggling</description></item><item><title>HTTP and API Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/http-and-api-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/http-and-api-fundamentals/</guid><description>HTTP and API Fundamentals HTTP and API Fundamentals - core HTTP concepts including methods, status codes, headers, and request lifecycle.
Related Links: API API Design API styles GraphQL GraphQL Fundamentals GRPC Open API Specification (OAS) REST REST API Design SOAP</description></item><item><title>Http caching</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/http-caching/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/http-caching/</guid><description>Http caching HTTP Caching - browser and proxy caching mechanisms using HTTP headers to reduce server load.
Related Links: Apache Caddy Domain name Domain name system Https Nginx Fundamentals Web servers</description></item><item><title>Https</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/https/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/https/</guid><description>Https HTTPS - secure version of HTTP using TLS encryption to protect data in transit.
Related Links: Apache Caddy Domain name Domain name system Http caching Nginx Fundamentals Web servers</description></item><item><title>HTTPS</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-protocols/https/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-protocols/https/</guid><description>HTTPS HTTPS - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Handshakes Networking Networking Fundamentals Subnetting</description></item><item><title>Hybrid Polling and Interrupt Models</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/hybrid-polling-and-interrupt-models/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/hybrid-polling-and-interrupt-models/</guid><description>Hybrid Polling and Interrupt Models Hybrid Polling and Interrupt Models - combined approach that uses interrupts to flag events and polling loops to process them, balancing latency and complexity.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>Hypervisors</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/hypervisors/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/hypervisors/</guid><description>Hypervisors Hypervisors - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>I2C</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/i2c/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/i2c/</guid><description>I2C I2C - two-wire serial bus protocol for short-distance communication between a master and multiple peripheral devices sharing clock and data lines.
Related Links: CAN Bus Monodon Firmware SPI UART</description></item><item><title>IaC Security</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/iac-tools/iac-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/iac-tools/iac-security/</guid><description>IaC Security IaC Security - scanning infrastructure code for misconfigurations, enforcing policy-as-code, and preventing secrets in version control.
Related Links: Configuration Management Fundamentals Infrastructure as Code Fundamentals Terraform Fundamentals</description></item><item><title>IaC Tools</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/iac-tools/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/iac-tools/</guid><description>IaC Tools IaC Tools - provisioning infrastructure declaratively with Terraform and enforcing configuration with management frameworks.
Configuration Management Fundamentals IaC Security Infrastructure as Code Fundamentals Terraform Fundamentals Related Links: Server Administration</description></item><item><title>IAM Policies</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/iam-policies/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/iam-policies/</guid><description>IAM Policies IAM Policies - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Active Directory Fundamentals Group Administration Identity and Access Management Fundamentals Identity Federation Pass the Hash Privileged Access Management User Administration</description></item><item><title>IAT API Set Resolution</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/iat-api-set-resolution/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/iat-api-set-resolution/</guid><description>IAT API Set Resolution IAT API Set Resolution - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>IAT Camouflage</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/iat-camouflage/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/iat-camouflage/</guid><description>IAT Camouflage IAT Camouflage - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>IAT Obfuscation Variants</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/iat-obfuscation-variants/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/iat-obfuscation-variants/</guid><description>IAT Obfuscation Variants IAT Obfuscation Variants - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>ICMP Echo</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/icmp-echo/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/icmp-echo/</guid><description>ICMP Echo ICMP Echo - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Lookup Host Check Network Attacks Network Evasion Techniques Network Protocols Port Scanning TCP Port Scan VPNs Wireless and Physical Attacks</description></item><item><title>Identity and Access Management Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/identity-and-access-management-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/identity-and-access-management-fundamentals/</guid><description>Identity and Access Management Fundamentals Identity and Access Management Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Active Directory Fundamentals Group Administration IAM Policies Identity Federation Pass the Hash Privileged Access Management User Administration</description></item><item><title>Identity Federation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/identity-federation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/identity-federation/</guid><description>Identity Federation Identity Federation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Active Directory Fundamentals Group Administration IAM Policies Identity and Access Management Fundamentals Pass the Hash Privileged Access Management User Administration</description></item><item><title>IDS Evasion Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/ids-evasion-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/ids-evasion-techniques/</guid><description>IDS Evasion Techniques IDS Evasion Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Illicit Consent Grant</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/illicit-consent-grant/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/illicit-consent-grant/</guid><description>Illicit Consent Grant Illicit Consent Grant - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx Phishlet Development Evilginx URL Rewriting GitHub Device Code Phishing GitLab Device Code Phishing Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Microsoft Device Code Phishing Protecting Evilginx Server via Caddy</description></item><item><title>Impersonate Process User</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/impersonate-process-user/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/impersonate-process-user/</guid><description>Impersonate Process User Impersonate Process User - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Impersonation Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/physical-social-engineering/impersonation-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/physical-social-engineering/impersonation-techniques/</guid><description>Impersonation Techniques Impersonation Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Dumpster Diving Lock Picking Pretexting</description></item><item><title>Improving Domain Reputation Domain Aging</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/improving-domain-reputation-domain-aging/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/improving-domain-reputation-domain-aging/</guid><description>Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Aging - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Improving Domain Reputation Domain Categorization</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/improving-domain-reputation-domain-categorization/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/improving-domain-reputation-domain-categorization/</guid><description>Improving Domain Reputation Domain Categorization Improving Domain Reputation Domain Categorization - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Improving Domain Reputation Web Traffic</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/improving-domain-reputation-web-traffic/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/improving-domain-reputation-web-traffic/</guid><description>Improving Domain Reputation Web Traffic Improving Domain Reputation Web Traffic - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Incident Management for SRE</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/observability-and-sre/incident-management-for-sre/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/observability-and-sre/incident-management-for-sre/</guid><description>Incident Management for SRE Incident Management for SRE - structured process for detecting, responding to, and learning from production incidents.
Related Links: Monitoring and Observability Monitoring Tools Observability Fundamentals SLI SLO SLA</description></item><item><title>Incident Response</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/incident-response/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/incident-response/</guid><description>Incident Response Incident Response - the coordinated approach to preparing for, detecting, containing, and recovering from cybersecurity incidents.
Incident Response Lifecycle Related Links: Anti-Forensic Techniques Automated Reverse Engineering Digital Forensics Forensics Hayabusa Threat Hunting Techniques</description></item><item><title>Incident Response and Forensics</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/</guid><description>Incident Response and Forensics Incident Response and Forensics - the structured process of detecting, analyzing, containing, and recovering from security incidents while preserving evidence.
Anti-Forensic Techniques Automated Reverse Engineering Digital Forensics Forensics Hayabusa Incident Response Threat Hunting Techniques Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Incident Response Lifecycle</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/incident-response/incident-response-lifecycle/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/incident-response/incident-response-lifecycle/</guid><description>Incident Response Lifecycle Incident Response Lifecycle - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links:</description></item><item><title>Incognito Mode Detection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/incognito-mode-detection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/incognito-mode-detection/</guid><description>Incognito Mode Detection Incognito Mode Detection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>Indexes and performance optimization</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/indexes-and-performance-optimization/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/indexes-and-performance-optimization/</guid><description>Indexes and performance optimization Indexes and Performance Optimization - strategies for using database indexes to improve query speed.
Related Links: Data replication Database index Database scaling Indexing and Query Performance N+1 query problem Performance tuning and query optimization Sharding</description></item><item><title>Indexing and Query Performance</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/indexing-and-query-performance/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/indexing-and-query-performance/</guid><description>Indexing and Query Performance Indexing and Query Performance - techniques for creating and maintaining database indexes to speed up queries.
Related Links: Data replication Database index Database scaling Indexes and performance optimization N+1 query problem Performance tuning and query optimization Sharding</description></item><item><title>Indirect Syscalls</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/indirect-syscalls/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/indirect-syscalls/</guid><description>Indirect Syscalls Indirect Syscalls - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Information Security Models</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/</guid><description>Information Security Models Information Security Models - frameworks, principles, and governance models used to guide the design and assessment of secure information systems.
CIA Triad Information Security Models Overview Privacy Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Information Security Models Overview</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/information-security-models-overview/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/information-security-models-overview/</guid><description>Information Security Models Overview Information Security Models Overview - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: CIA Triad Privacy</description></item><item><title>Infrared Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/infrared-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/infrared-exploits/</guid><description>Infrared Exploits Infrared Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Acoustic Communication Exploits Bluetooth Exploits Deauth Evil Twin Attacks Near-Field Communication (NFC) Exploits Power Line Communication Exploits Quantum Communication Exploits Radio Frequency Exploits Rogue Access Point Satellite Communication Exploits Ultrasonic Communication Exploits Visible Light Communication Exploits WiFi Exploits</description></item><item><title>Infrastructure</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/</guid><description>Infrastructure Infrastructure - the server setup, domain configuration, SSL management, and automation required to deploy and operate phishing campaigns.
Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt Related Links: AitM and MFA Bypass Anti-Bot Email Attachments and Phishing Campaigns HTML Smuggling Introduction to Phishing Page Design and Delivery Phishing Anti-Analysis Phishing Requirements</description></item><item><title>Infrastructure as Code</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/</guid><description>Infrastructure as Code Infrastructure as Code - provisioning, managing, and securing infrastructure through versioned code and automation.
IaC Tools Server Administration Related Links: CI-CD Containers and Kubernetes DevOps and Platform Engineering Observability and SRE</description></item><item><title>Infrastructure as Code Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/iac-tools/infrastructure-as-code-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/iac-tools/infrastructure-as-code-fundamentals/</guid><description>Infrastructure as Code Fundamentals Infrastructure as Code Fundamentals - defining, versioning, and automating infrastructure provisioning for repeatable deployments.
Related Links: Configuration Management Fundamentals IaC Security Terraform Fundamentals</description></item><item><title>Injection Attacks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/</guid><description>Injection Attacks Injection Attacks - attack techniques that insert malicious data into an application to alter its execution or query behavior.
Buffer Overflows CSRF Directory Traversal SQL Injection Timing Attacks XSS Related Links: Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks</description></item><item><title>Inserting a Custom Section into a PE</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/inserting-a-custom-section-into-a-pe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/inserting-a-custom-section-into-a-pe/</guid><description>Inserting a Custom Section into a PE Inserting a Custom Section into a PE - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Instrumentation and monitoring</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/instrumentation-and-monitoring/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/instrumentation-and-monitoring/</guid><description>Instrumentation and monitoring Instrumentation and Monitoring - practices for measuring system behavior and observing application health.
Related Links: Building for scale Caching Caching Fundamentals Docker Kubernetes Profiling performance System Design Fundamentals Telemetry</description></item><item><title>Integrating Anti-Bot with HTML Smuggling</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/integrating-anti-bot-with-html-smuggling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/integrating-anti-bot-with-html-smuggling/</guid><description>Integrating Anti-Bot with HTML Smuggling Integrating Anti-Bot with HTML Smuggling - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing and Evading SmuggleShield HTML Smuggling HTML Smuggling Strategies MOTW Bypass via FileFix Variations SVG Smuggling WebAssembly Smuggling</description></item><item><title>Integrating Backend Functionality</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/integrating-backend-functionality/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/integrating-backend-functionality/</guid><description>Integrating Backend Functionality Integrating Backend Functionality - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ClickFix Run Dialog Alternatives Cloning Websites via Browser Extension Designing Custom Phishing Pages Introduction to Apache Mod Rewrite Introduction to ClickFix Introduction to Flask Living Off Trusted Sites (LOTS)</description></item><item><title>Integration testing</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/integration-testing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/integration-testing/</guid><description>Integration testing Integration Testing - testing interactions between components to ensure they work together correctly.
Related Links: Code reviews Documentation generation Functional testing Git Refactoring Unit testing</description></item><item><title>Intercepting Proxy</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/burp-suite/intercepting-proxy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/burp-suite/intercepting-proxy/</guid><description>Intercepting Proxy Intercepting Proxy - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Burp Suite Fundamentals Intruder Repeater Scanner</description></item><item><title>Interrupt-Driven Execution</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/interrupt-driven-execution/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/interrupt-driven-execution/</guid><description>Interrupt-Driven Execution Interrupt-Driven Execution - firmware architecture where hardware interrupt service routines respond to peripheral events asynchronously with the main execution flow.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>Interruptions</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/interruptions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/interruptions/</guid><description>Interruptions Interruptions - hardware interrupt signals on Cortex-M that trigger IRQ handlers via the NVIC, including priority management, nesting, and tail-chaining behavior.
Related Links: Boot Flow on Cortex-M Exceptions MPU Usage Patterns NVIC TrustZone-M</description></item><item><title>Introduction to AMSI</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/amsi-bypass/introduction-to-amsi/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/amsi-bypass/introduction-to-amsi/</guid><description>Introduction to AMSI Introduction to AMSI - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AMSI Bypass Byte Patching AMSI Evasion AMSI Evasion via Hardware Breakpoint Hooks AMSI Evasion via Patching Patchless AMSI Bypass via Hardware Breakpoints</description></item><item><title>Introduction to Apache Mod Rewrite</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/introduction-to-apache-mod-rewrite/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/introduction-to-apache-mod-rewrite/</guid><description>Introduction to Apache Mod Rewrite Introduction to Apache Mod Rewrite - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ClickFix Run Dialog Alternatives Cloning Websites via Browser Extension Designing Custom Phishing Pages Integrating Backend Functionality Introduction to ClickFix Introduction to Flask Living Off Trusted Sites (LOTS)</description></item><item><title>Introduction to BOF</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/beacon-object-files-bof/introduction-to-bof/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/beacon-object-files-bof/introduction-to-bof/</guid><description>Introduction to BOF Introduction to BOF - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: BOF Execution LSASS Dump BOF Object File Loader with Module Stomping Threadless Shellcode Injection via HWBPs BOF Writing BOF Files</description></item><item><title>Introduction to Caddy</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/introduction-to-caddy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/introduction-to-caddy/</guid><description>Introduction to Caddy Introduction to Caddy - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Introduction to ClickFix</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/introduction-to-clickfix/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/introduction-to-clickfix/</guid><description>Introduction to ClickFix Introduction to ClickFix - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ClickFix Run Dialog Alternatives Cloning Websites via Browser Extension Designing Custom Phishing Pages Integrating Backend Functionality Introduction to Apache Mod Rewrite Introduction to Flask Living Off Trusted Sites (LOTS)</description></item><item><title>Introduction to DLL Sideloading</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/introduction-to-dll-sideloading/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/introduction-to-dll-sideloading/</guid><description>Introduction to DLL Sideloading Introduction to DLL Sideloading - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Introduction to EDRs</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/introduction-to-edrs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/introduction-to-edrs/</guid><description>Introduction to EDRs Introduction to EDRs - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Introduction to Ekko Sleep Obfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/introduction-to-ekko-sleep-obfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/introduction-to-ekko-sleep-obfuscation/</guid><description>Introduction to Ekko Sleep Obfuscation Introduction to Ekko Sleep Obfuscation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ekko Sleep Obfuscation with Control Flow Guard Ekko Sleep Obfuscation with Restored File Section Protections Ekko Sleep Obfuscation with RtlEncryptMemory and RtlDecryptMemory Ekko Sleep Obfuscation with Stack Spoofing Heap Encryption with Ekko Sleep Obfuscation Introduction to Foliage Sleep Obfuscation Introduction to Sleep Obfuscation PEfluctuation Zilean Sleep Obfuscation with Stack Duplication</description></item><item><title>Introduction to ETW</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/introduction-to-etw/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/introduction-to-etw/</guid><description>Introduction to ETW Introduction to ETW - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ETW Bypass Byte Patching ETW Bypass Improved Patching ETW Discovering ETW Tools ETW Evasion ETW Evasion via NtTraceEvent Patching ETW Evasion via Patching ETW Evasion via Patching EtwpEventWrite ETW Evasion via Patching EtwpEventWrite v2 ETW Evasion via WinAPIs Patching ETW Provider Session Hijacking Patchless ETW Bypass via Hardware Breakpoints</description></item><item><title>Introduction to Flask</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/introduction-to-flask/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/introduction-to-flask/</guid><description>Introduction to Flask Introduction to Flask - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ClickFix Run Dialog Alternatives Cloning Websites via Browser Extension Designing Custom Phishing Pages Integrating Backend Functionality Introduction to Apache Mod Rewrite Introduction to ClickFix Living Off Trusted Sites (LOTS)</description></item><item><title>Introduction to Foliage Sleep Obfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/introduction-to-foliage-sleep-obfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/introduction-to-foliage-sleep-obfuscation/</guid><description>Introduction to Foliage Sleep Obfuscation Introduction to Foliage Sleep Obfuscation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ekko Sleep Obfuscation with Control Flow Guard Ekko Sleep Obfuscation with Restored File Section Protections Ekko Sleep Obfuscation with RtlEncryptMemory and RtlDecryptMemory Ekko Sleep Obfuscation with Stack Spoofing Heap Encryption with Ekko Sleep Obfuscation Introduction to Ekko Sleep Obfuscation Introduction to Sleep Obfuscation PEfluctuation Zilean Sleep Obfuscation with Stack Duplication</description></item><item><title>Introduction to Havoc C2</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/introduction-to-havoc-c2/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/introduction-to-havoc-c2/</guid><description>Introduction to Havoc C2 Introduction to Havoc C2 - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Introduction to Keylogging</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/introduction-to-keylogging/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/introduction-to-keylogging/</guid><description>Introduction to Keylogging Introduction to Keylogging - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Introduction to LSASS Dumping</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/introduction-to-lsass-dumping/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/introduction-to-lsass-dumping/</guid><description>Introduction to LSASS Dumping Introduction to LSASS Dumping - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Introduction to MASM Assembly</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/introduction-to-masm-assembly/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/introduction-to-masm-assembly/</guid><description>Introduction to MASM Assembly Introduction to MASM Assembly - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Introduction to Nginx Capabilities</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/nginx/introduction-to-nginx-capabilities/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/nginx/introduction-to-nginx-capabilities/</guid><description>Introduction to Nginx Capabilities Introduction to Nginx Capabilities - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Nginx Demo Reverse Proxying Nginx Fundamentals Protecting Phishing Servers via Nginx</description></item><item><title>Introduction to Phishing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/introduction-to-phishing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/introduction-to-phishing/</guid><description>Introduction to Phishing Introduction to Phishing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AitM and MFA Bypass Anti-Bot Email Attachments and Phishing Campaigns HTML Smuggling Infrastructure Page Design and Delivery Phishing Anti-Analysis Phishing Requirements</description></item><item><title>Introduction to Sleep Obfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/introduction-to-sleep-obfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/introduction-to-sleep-obfuscation/</guid><description>Introduction to Sleep Obfuscation Introduction to Sleep Obfuscation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ekko Sleep Obfuscation with Control Flow Guard Ekko Sleep Obfuscation with Restored File Section Protections Ekko Sleep Obfuscation with RtlEncryptMemory and RtlDecryptMemory Ekko Sleep Obfuscation with Stack Spoofing Heap Encryption with Ekko Sleep Obfuscation Introduction to Ekko Sleep Obfuscation Introduction to Foliage Sleep Obfuscation PEfluctuation Zilean Sleep Obfuscation with Stack Duplication</description></item><item><title>Introduction to the Windows OS</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/introduction-to-the-windows-os/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/introduction-to-the-windows-os/</guid><description>Introduction to the Windows OS Introduction to the Windows OS - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Introduction to Windows Persistence</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/introduction-to-windows-persistence/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/introduction-to-windows-persistence/</guid><description>Introduction to Windows Persistence Introduction to Windows Persistence - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Abusing WMI for Persistence Persistence via COM Object Hijacking Persistence via Electron Applications Persistence via File System Persistence via Startup Folder Persistence via Windows Registry Persistence via Windows Services Persistence via Windows Tasks</description></item><item><title>Intruder</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/burp-suite/intruder/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/burp-suite/intruder/</guid><description>Intruder Intruder - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Burp Suite Fundamentals Intercepting Proxy Repeater Scanner</description></item><item><title>Invisible Proxy OPSEC Considerations</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/invisible-proxy-opsec-considerations/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/invisible-proxy-opsec-considerations/</guid><description>Invisible Proxy OPSEC Considerations Invisible Proxy OPSEC Considerations - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx Phishlet Development Evilginx URL Rewriting GitHub Device Code Phishing GitLab Device Code Phishing Illicit Consent Grant Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Microsoft Device Code Phishing Protecting Evilginx Server via Caddy</description></item><item><title>IP Address Whitelisting</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/ip-address-whitelisting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/ip-address-whitelisting/</guid><description>IP Address Whitelisting IP Address Whitelisting - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Ipconfig and Ifconfig</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/linux-operating-system/ipconfig-and-ifconfig/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/linux-operating-system/ipconfig-and-ifconfig/</guid><description>Ipconfig and Ifconfig Ipconfig and Ifconfig - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Kali vs Parrot vs BlackArch vs Qubes Linux Fundamentals Ping</description></item><item><title>ISA</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/cpu-core-concepts/isa/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/cpu-core-concepts/isa/</guid><description>ISA ISA - the Instruction Set Architecture defining the set of operations a processor can execute, including encoding formats, addressing modes, and the programmer-visible register model.
Related Links: Privilege Levels</description></item><item><title>ISR-to-Task Communication Patterns</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/isr-to-task-communication-patterns/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/isr-to-task-communication-patterns/</guid><description>ISR-to-Task Communication Patterns ISR-to-Task Communication Patterns - mechanisms for safely passing data and signals from interrupt service routines to application-level tasks.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>JA3 JA3S Fingerprinting</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/ja3-ja3s-fingerprinting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/ja3-ja3s-fingerprinting/</guid><description>JA3 JA3S Fingerprinting JA3 JA3S Fingerprinting - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>JA4 Analysis Blacklisting JA4 Fingerprints</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/ja4-analysis-blacklisting-ja4-fingerprints/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/ja4-analysis-blacklisting-ja4-fingerprints/</guid><description>JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting JA4 Fingerprints - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>JA4 Analysis Blacklisting Partial JA4 Fingerprints</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/ja4-analysis-blacklisting-partial-ja4-fingerprints/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/ja4-analysis-blacklisting-partial-ja4-fingerprints/</guid><description>JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>JA4 Analysis Calculating JA4 Fingerprints</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/ja4-analysis-calculating-ja4-fingerprints/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/ja4-analysis-calculating-ja4-fingerprints/</guid><description>JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>JA4 Analysis Whitelisting Partial JA4 Fingerprints</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/ja4-analysis-whitelisting-partial-ja4-fingerprints/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/ja4-analysis-whitelisting-partial-ja4-fingerprints/</guid><description>JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 JA4S Fingerprinting JARM Fingerprinting</description></item><item><title>JA4 JA4S Fingerprinting</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/ja4-ja4s-fingerprinting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/ja4-ja4s-fingerprinting/</guid><description>JA4 JA4S Fingerprinting JA4 JA4S Fingerprinting - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JARM Fingerprinting</description></item><item><title>Jail Breaking</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/jail-breaking/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/jail-breaking/</guid><description>Jail Breaking Jail Breaking - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item><item><title>JARM Fingerprinting</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/jarm-fingerprinting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/anti-bot/jarm-fingerprinting/</guid><description>JARM Fingerprinting JARM Fingerprinting - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ad Blocker Detection Anti-Bot Library Anti-Bot via Advanced JA4 Analysis Anti-Bot via CAPTCHA Anti-Bot via Improper Window Size Anti-Bot via User Agent Filtering Anti-Bot via User Agent Spoofing Detection Anti-Bot via User Interaction Client Analysis via Cloudflare Workers Client Logging Library Collecting and Analyzing Bot Telemetry Collecting and Analyzing JA4 Bot Telemetry Detecting Headless Browsers via WebDriver Property Incognito Mode Detection JA3 JA3S Fingerprinting JA4 Analysis Blacklisting JA4 Fingerprints JA4 Analysis Blacklisting Partial JA4 Fingerprints JA4 Analysis Calculating JA4 Fingerprints JA4 Analysis Whitelisting Partial JA4 Fingerprints JA4 JA4S Fingerprinting</description></item><item><title>Join queries</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/join-queries/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/join-queries/</guid><description>Join queries Join Queries - SQL operations combining rows from two or more tables based on related columns.
Related Links: Advanced SQL Aggregate queries Common table expressions (CTEs) Dynamic SQL Pivot and unpivot operations Recursive queries Select, insert, delete, update statements Stored procedures and triggers Subqueries Views Window functions</description></item><item><title>JS String Hashing Algorithm</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/js-string-hashing-algorithm/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/js-string-hashing-algorithm/</guid><description>JS String Hashing Algorithm JS String Hashing Algorithm - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>JS String Hashing Algorithm ASCII</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/js-string-hashing-algorithm-ascii/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/js-string-hashing-algorithm-ascii/</guid><description>JS String Hashing Algorithm ASCII JS String Hashing Algorithm ASCII - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>JS String Hashing Syscalls Hash Values NT</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/js-string-hashing-syscalls-hash-values-nt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/js-string-hashing-syscalls-hash-values-nt/</guid><description>JS String Hashing Syscalls Hash Values NT JS String Hashing Syscalls Hash Values NT - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>JS Syscalls Hash Values ZW</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/js-syscalls-hash-values-zw/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/js-syscalls-hash-values-zw/</guid><description>JS Syscalls Hash Values ZW JS Syscalls Hash Values ZW - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>JS WinAPIs Hash Values</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/js-winapis-hash-values/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/js-winapis-hash-values/</guid><description>JS WinAPIs Hash Values JS WinAPIs Hash Values - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Jump Server</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/jump-server/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/jump-server/</guid><description>Jump Server Jump Server - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DMZ Firewalls Overview Honeypots Microsegmentation Network Segmentation Port Blocking Zero Trust Architecture</description></item><item><title>Kali vs Parrot vs BlackArch vs Qubes</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/linux-operating-system/kali-vs-parrot-vs-blackarch-vs-qubes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/linux-operating-system/kali-vs-parrot-vs-blackarch-vs-qubes/</guid><description>Kali vs Parrot vs BlackArch vs Qubes Kali vs Parrot vs BlackArch vs Qubes - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ipconfig and Ifconfig Linux Fundamentals Ping</description></item><item><title>Kernel Modules Enumeration via AuxKlibQueryModuleInformation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/kernel-modules-enumeration-via-auxklibquerymoduleinformation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/kernel-modules-enumeration-via-auxklibquerymoduleinformation/</guid><description>Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via AuxKlibQueryModuleInformation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Kernel Modules Enumeration via PsLoadedModuleList</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/kernel-modules-enumeration-via-psloadedmodulelist/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/kernel-modules-enumeration-via-psloadedmodulelist/</guid><description>Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via PsLoadedModuleList - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Kernel Modules Enumeration via ZwQuerySystemInformation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/kernel-modules-enumeration-via-zwquerysysteminformation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/kernel-modules-enumeration-via-zwquerysysteminformation/</guid><description>Kernel Modules Enumeration via ZwQuerySystemInformation Kernel Modules Enumeration via ZwQuerySystemInformation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Key value</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/key-value/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/key-value/</guid><description>Key value Key-Value Stores - simplest NoSQL database form storing data as key-value pairs for fast lookups.
Related Links: Column dbs Document dbs Elasticsearch Graphdbs Memcached Non-relational databases NoSQL databases Redis Relational databases Search engines Solr Time series dbs Vector databases</description></item><item><title>KnownDLL Cache Poisoning Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/knowndll-cache-poisoning-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/knowndll-cache-poisoning-injection/</guid><description>KnownDLL Cache Poisoning Injection KnownDLL Cache Poisoning Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Kubernetes</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/kubernetes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/kubernetes/</guid><description>Kubernetes Kubernetes - container orchestration system for automating deployment, scaling, and management of containerized apps.
Related Links: Building for scale Caching Caching Fundamentals Docker Instrumentation and monitoring Profiling performance System Design Fundamentals Telemetry</description></item><item><title>Kubernetes Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/containers-and-kubernetes/kubernetes-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/containers-and-kubernetes/kubernetes-fundamentals/</guid><description>Kubernetes Fundamentals Kubernetes Fundamentals - orchestrating containerized workloads with pods, deployments, services, and ingress controllers.
Related Links: Container Fundamentals Container Scanning Tools Docker Security Kubernetes Security Kubernetes Security Basics</description></item><item><title>Kubernetes Security</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/containers-and-kubernetes/kubernetes-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/containers-and-kubernetes/kubernetes-security/</guid><description>Kubernetes Security Kubernetes Security - securing Kubernetes clusters through network policies, secrets management, and runtime protection.
Related Links: Container Fundamentals Container Scanning Tools Docker Security Kubernetes Fundamentals Kubernetes Security Basics</description></item><item><title>Kubernetes Security Basics</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/containers-and-kubernetes/kubernetes-security-basics/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/containers-and-kubernetes/kubernetes-security-basics/</guid><description>Kubernetes Security Basics Kubernetes Security Basics - foundational K8s security controls including RBAC, network policies, and admission controllers.
Related Links: Container Fundamentals Container Scanning Tools Docker Security Kubernetes Fundamentals Kubernetes Security</description></item><item><title>Lab Home</title><link>https://r0tbyt3.dev/wiki/labs/lab-home/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/labs/lab-home/</guid><description>Tracks Crackmes.one Hack the Box Portswigger Academy RingZer0 CTF TryHackMe Related Home Cybersecurity DevOps and Platform Engineering Embedded Systems Backend Engineering</description></item><item><title>Language Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/language-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/language-fundamentals/</guid><description>Language Fundamentals Language Fundamentals - core Python syntax, operators, data types, and functional programming constructs.
Advanced functions Basic keywords Basic operators Basic data types Related Links: AI and LLMs Software Engineering</description></item><item><title>Lateral Movement Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/lateral-movement-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/lateral-movement-techniques/</guid><description>Lateral Movement Techniques Lateral Movement Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item><item><title>LDAP Query</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/ldap-query/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/ldap-query/</guid><description>LDAP Query LDAP Query - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Library Proxy Loading</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/library-proxy-loading/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/library-proxy-loading/</guid><description>Library Proxy Loading Library Proxy Loading - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Linked Lists</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/linked-lists/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/linked-lists/</guid><description>Linked Lists Linked Lists - node-based dynamic data structure with O(1) insertion at known positions and O(n) access by index.
Related Links: Arrays Binary Search Trees Graphs Hash Tables Heaps Queues Sets Stacks Strings Trees Tries</description></item><item><title>Linux Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/linux-operating-system/linux-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/linux-operating-system/linux-fundamentals/</guid><description>Linux Fundamentals Linux Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ipconfig and Ifconfig Kali vs Parrot vs BlackArch vs Qubes Ping</description></item><item><title>Linux Operating System</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/linux-operating-system/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/linux-operating-system/</guid><description>Linux Operating System Linux Operating System - Linux fundamentals, administration, and command-line tools used in cybersecurity operations and penetration testing environments.
Ipconfig and Ifconfig Kali vs Parrot vs BlackArch vs Qubes Linux Fundamentals Ping Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Linux Security and Hardening</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/server-administration/linux-security-and-hardening/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/server-administration/linux-security-and-hardening/</guid><description>Linux Security and Hardening Linux Security and Hardening - reducing attack surface on Linux servers through permissions, kernel parameters, and audit logging.
Related Links: Firewall Configuration Linux Server Administration SSH Windows Security and Hardening Windows Server Administration</description></item><item><title>Linux Server Administration</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/server-administration/linux-server-administration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/server-administration/linux-server-administration/</guid><description>Linux Server Administration Linux Server Administration - managing Linux systems including package management, process control, storage, and networking.
Related Links: Firewall Configuration Linux Security and Hardening SSH Windows Security and Hardening Windows Server Administration</description></item><item><title>List SMB Files</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/list-smb-files/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/list-smb-files/</guid><description>List SMB Files List SMB Files - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Living Off the Land (LOTL) Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/living-off-the-land-lotl-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/living-off-the-land-lotl-techniques/</guid><description>Living Off the Land (LOTL) Techniques Living Off the Land (LOTL) Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item><item><title>Living Off Trusted Sites (LOTS)</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/living-off-trusted-sites-lots/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/living-off-trusted-sites-lots/</guid><description>Living Off Trusted Sites (LOTS) Living Off Trusted Sites (LOTS) - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ClickFix Run Dialog Alternatives Cloning Websites via Browser Extension Designing Custom Phishing Pages Integrating Backend Functionality Introduction to Apache Mod Rewrite Introduction to ClickFix Introduction to Flask</description></item><item><title>Loadshifting</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/loadshifting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/loadshifting/</guid><description>Loadshifting Load Shifting - redistributing workload across time or resources to avoid processing bottlenecks.
Related Links: Backpressure Circuit breakers Event-driven architecture Failure modes Graceful degradation Rate limiting Real time data Realtime Server sent events short polling Streaming Throttling Websockets</description></item><item><title>Local APC Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/local-apc-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/local-apc-injection/</guid><description>Local APC Injection Local APC Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Local DLL Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/local-dll-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/local-dll-injection/</guid><description>Local DLL Injection Local DLL Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Local Function Stomping</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/local-function-stomping/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/local-function-stomping/</guid><description>Local Function Stomping Local Function Stomping - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Local Mapping Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/local-mapping-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/local-mapping-injection/</guid><description>Local Mapping Injection Local Mapping Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Local Payload Execution</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/local-payload-execution/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/local-payload-execution/</guid><description>Local Payload Execution Local Payload Execution - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Local PE Execution</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/local-pe-execution/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/local-pe-execution/</guid><description>Local PE Execution Local PE Execution - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Local Shellcode Execution</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/local-shellcode-execution/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/local-shellcode-execution/</guid><description>Local Shellcode Execution Local Shellcode Execution - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Lock Picking</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/physical-social-engineering/lock-picking/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/physical-social-engineering/lock-picking/</guid><description>Lock Picking Lock Picking - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Dumpster Diving Impersonation Techniques Pretexting</description></item><item><title>Log Tampering Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/log-tampering-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/log-tampering-techniques/</guid><description>Log Tampering Techniques Log Tampering Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Forensic Techniques Covering Tracks Techniques Data Destruction Techniques File Time Stomping Self-Deletion Techniques Shadow Copy Deletion Timestomping Techniques</description></item><item><title>Lookup Privilege Value MS-LSAD</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/lookup-privilege-value-ms-lsad/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/lookup-privilege-value-ms-lsad/</guid><description>Lookup Privilege Value MS-LSAD Lookup Privilege Value MS-LSAD - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>LSASS Dump BOF</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/beacon-object-files-bof/lsass-dump-bof/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/beacon-object-files-bof/lsass-dump-bof/</guid><description>LSASS Dump BOF LSASS Dump BOF - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: BOF Execution Introduction to BOF Object File Loader with Module Stomping Threadless Shellcode Injection via HWBPs BOF Writing BOF Files</description></item><item><title>LSASS Dump via Handle Duplication</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/lsass-dump-via-handle-duplication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/lsass-dump-via-handle-duplication/</guid><description>LSASS Dump via Handle Duplication LSASS Dump via Handle Duplication - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>LSASS Dump via MiniDumpWriteDump</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/lsass-dump-via-minidumpwritedump/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/lsass-dump-via-minidumpwritedump/</guid><description>LSASS Dump via MiniDumpWriteDump LSASS Dump via MiniDumpWriteDump - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>LSASS Dump via RtlReportSilentProcessExit</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/lsass-dump-via-rtlreportsilentprocessexit/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/lsass-dump-via-rtlreportsilentprocessexit/</guid><description>LSASS Dump via RtlReportSilentProcessExit LSASS Dump via RtlReportSilentProcessExit - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>LSASS Dump via SecLogon Race Condition</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/lsass-dump-via-seclogon-race-condition/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/lsass-dump-via-seclogon-race-condition/</guid><description>LSASS Dump via SecLogon Race Condition LSASS Dump via SecLogon Race Condition - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Maintaining Persistence Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/maintaining-persistence-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/maintaining-persistence-techniques/</guid><description>Maintaining Persistence Techniques Maintaining Persistence Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item><item><title>Maltego</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/maltego/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/maltego/</guid><description>Maltego Maltego - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analysis Methods Automated Malware Analysis Memory Leaks Metasploit Reverse Engineering Urlvoid Virustotal</description></item><item><title>Maltego</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/maltego/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/maltego/</guid><description>Maltego Maltego - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Hayabusa SIEM Fundamentals Splunk</description></item><item><title>Malware Analysis</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/</guid><description>Malware Analysis Malware Analysis - the process of examining malicious software to understand its behavior, functionality, origin, and impact on affected systems.
Analysis Methods Automated Malware Analysis Maltego Memory Leaks Metasploit Reverse Engineering Urlvoid Virustotal Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Malware Analysis Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/analysis-methods/malware-analysis-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/analysis-methods/malware-analysis-techniques/</guid><description>Malware Analysis Techniques Malware Analysis Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Dynamic Analysis Static Analysis</description></item><item><title>Malware Binary Signing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/malware-binary-signing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/malware-binary-signing/</guid><description>Malware Binary Signing Malware Binary Signing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Malware Binary Signing Obfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/malware-binary-signing-obfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/malware-binary-signing-obfuscation/</guid><description>Malware Binary Signing Obfuscation Malware Binary Signing Obfuscation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Malware Compiling</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/malware-compiling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/malware-compiling/</guid><description>Malware Compiling Malware Compiling - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Malware Concepts</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/</guid><description>Malware Concepts Malware Concepts - foundational knowledge about malware types, behaviors, and development techniques used in offensive security research.
Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates Related Links: Beacon Object Files (BOF) C2 and Networking Credential Dumping Payload and PE Persistence Process Injection Sleep Obfuscation Windows Internals</description></item><item><title>Malware Development</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/</guid><description>Malware Development Malware Development - the study of techniques used to create, deploy, and operate malicious software including loaders, implants, and post-exploitation tools.
Beacon Object Files (BOF) C2 and Networking Credential Dumping Malware Concepts Payload and PE Persistence Process Injection Sleep Obfuscation Windows Internals Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Malware Development Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/malware-development-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/malware-development-techniques/</guid><description>Malware Development Techniques Malware Development Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Malware Directory Placement</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/malware-directory-placement/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/malware-directory-placement/</guid><description>Malware Directory Placement Malware Directory Placement - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Malware Kill Date</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/malware-kill-date/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/malware-kill-date/</guid><description>Malware Kill Date Malware Kill Date - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Malware Working Hours</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/malware-working-hours/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/malware-working-hours/</guid><description>Malware Working Hours Malware Working Hours - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Manual TOTP Harvesting</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/manual-totp-harvesting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/manual-totp-harvesting/</guid><description>Manual TOTP Harvesting Manual TOTP Harvesting - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx Phishlet Development Evilginx URL Rewriting GitHub Device Code Phishing GitLab Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Microsoft Device Code Phishing Protecting Evilginx Server via Caddy</description></item><item><title>Manually Mapping API Set Names</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/manually-mapping-api-set-names/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/manually-mapping-api-set-names/</guid><description>Manually Mapping API Set Names Manually Mapping API Set Names - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>MD5</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/md5/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/md5/</guid><description>MD5 MD5 - cryptographic hash function producing a 128-bit digest, now considered insecure for security use.
Related Links: Argon2 Bcrypt Hashing algorithms Scrypt SHA-1 SHA-256 TLS</description></item><item><title>Memcached</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/memcached/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/memcached/</guid><description>Memcached Memcached - distributed memory caching system for speeding up dynamic web applications.
Related Links: Column dbs Document dbs Elasticsearch Graphdbs Key value Non-relational databases NoSQL databases Redis Relational databases Search engines Solr Time series dbs Vector databases</description></item><item><title>Memory Architecture</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/memory-architecture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/memory-architecture/</guid><description>Memory Architecture Memory Architecture - the organization of instruction and data memory in embedded processors, including the distinctions between Harvard and Von Neumann architectures and their trade-offs.
Harvard Von Neumann Related Links: Arm M-profile Bus Fabrics and On-Chip Interconnects CPU Core Concepts Heterogeneous SoCs and Co-processors Power and Clock Domain Architecture RISC-V Single Core vs Multi-Core Architectures</description></item><item><title>Memory Forensics</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/digital-forensics/memory-forensics/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/digital-forensics/memory-forensics/</guid><description>Memory Forensics Memory Forensics - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Disk Forensics Host Forensics Fundamentals</description></item><item><title>Memory Hardware</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/memory-hardware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/memory-hardware/</guid><description>Memory Hardware Memory Hardware - physical memory devices used in embedded systems including Flash, SRAM, EEPROM, and external memory interfaces.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Memory Leaks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/memory-leaks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/memory-leaks/</guid><description>Memory Leaks Memory Leaks - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analysis Methods Automated Malware Analysis Maltego Metasploit Reverse Engineering Urlvoid Virustotal</description></item><item><title>Merge Intervals</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/merge-intervals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/merge-intervals/</guid><description>Merge Intervals Merge Intervals - sorting and sweeping through intervals to merge overlapping ranges in O(n log n).
Related Links: BFS Pattern Binary Search Pattern DFS Pattern Fast and Slow Pointers Monotonic Stack Sliding Window Top K Elements Two Pointers Union Find</description></item><item><title>Metamorphic Malware</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/metamorphic-malware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/metamorphic-malware/</guid><description>Metamorphic Malware Metamorphic Malware - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Metasploit</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/metasploit/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/metasploit/</guid><description>Metasploit Metasploit - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analysis Methods Automated Malware Analysis Maltego Memory Leaks Reverse Engineering Urlvoid Virustotal</description></item><item><title>MFA Bypass Azure AitM Phishing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/mfa-bypass-azure-aitm-phishing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/mfa-bypass-azure-aitm-phishing/</guid><description>MFA Bypass Azure AitM Phishing MFA Bypass Azure AitM Phishing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx Phishlet Development Evilginx URL Rewriting GitHub Device Code Phishing GitLab Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Microsoft Device Code Phishing Protecting Evilginx Server via Caddy</description></item><item><title>MFA Bypass Building an Invisible Proxy</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/mfa-bypass-building-an-invisible-proxy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/mfa-bypass-building-an-invisible-proxy/</guid><description>MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx Phishlet Development Evilginx URL Rewriting GitHub Device Code Phishing GitLab Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy via Cloudflare Workers Microsoft Device Code Phishing Protecting Evilginx Server via Caddy</description></item><item><title>MFA Bypass Building an Invisible Proxy via Cloudflare Workers</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/mfa-bypass-building-an-invisible-proxy-via-cloudflare-workers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/mfa-bypass-building-an-invisible-proxy-via-cloudflare-workers/</guid><description>MFA Bypass Building an Invisible Proxy via Cloudflare Workers MFA Bypass Building an Invisible Proxy via Cloudflare Workers - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx Phishlet Development Evilginx URL Rewriting GitHub Device Code Phishing GitLab Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy Microsoft Device Code Phishing Protecting Evilginx Server via Caddy</description></item><item><title>Microcontrollers and Selection Criteria</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/microcontrollers-and-selection-criteria/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/microcontrollers-and-selection-criteria/</guid><description>Microcontrollers and Selection Criteria Microcontrollers and Selection Criteria - factors and trade-offs involved in selecting a microcontroller for an embedded application, including performance, power, and peripherals.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Microsegmentation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/microsegmentation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/microsegmentation/</guid><description>Microsegmentation Microsegmentation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DMZ Firewalls Overview Honeypots Jump Server Network Segmentation Port Blocking Zero Trust Architecture</description></item><item><title>Microservices</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/microservices/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/microservices/</guid><description>Microservices Microservices - architectural style structuring applications as independently deployable small services.
Related Links: Architectural patterns Backend Architecture Monolith Monolith vs Microservices Serverless Serverless computing Service mesh architecture Service meshes Service-oriented architecture (SOA) Twelve-factor app</description></item><item><title>Microsoft Device Code Phishing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/microsoft-device-code-phishing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/microsoft-device-code-phishing/</guid><description>Microsoft Device Code Phishing Microsoft Device Code Phishing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx Phishlet Development Evilginx URL Rewriting GitHub Device Code Phishing GitLab Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Protecting Evilginx Server via Caddy</description></item><item><title>Middleware</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/middleware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/middleware/</guid><description>Middleware Middleware - globally applied hooks for processing requests before they reach a view and responses before they are returned.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>Migrations</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/migrations/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/migrations/</guid><description>Migrations Migrations - version-controlled changes to database schema applied incrementally over time.
Related Links: ACID CAP theorem Data constraints Data definition language Data integrity and normalization and security Data manipulation language Databases and Data Modeling Normalization ORMs Transactions Transactions and isolation levels</description></item><item><title>Migrations</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/migrations/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/migrations/</guid><description>Migrations Migrations - Django&amp;rsquo;s system for propagating model changes to the database schema incrementally and reversibly.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>Mitigation techniques</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/mitigation-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/mitigation-techniques/</guid><description>Mitigation techniques Mitigation Techniques - strategies for reducing the impact or likelihood of security vulnerabilities.
Related Links: API security best practices Container security best practices CORS CSP OWASP risks Server security</description></item><item><title>MITM</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/mitm/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/mitm/</guid><description>MITM MITM - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Poisoning Network Attacks Overview Packet Sniffing Exploits Spoofing VLAN Hopping VMescape Exploits</description></item><item><title>MITRE ATT&amp;CK Mapping</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/detection-engineering/mitre-attck-mapping/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/detection-engineering/mitre-attck-mapping/</guid><description>MITRE ATT&amp;amp;CK Mapping MITRE ATT&amp;amp;CK Mapping - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Detection Engineering Fundamentals</description></item><item><title>Mmgetsystemroutineaddress Replacement String Hashing Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/mmgetsystemroutineaddress-replacement-string-hashing-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/mmgetsystemroutineaddress-replacement-string-hashing-kernel/</guid><description>Mmgetsystemroutineaddress Replacement String Hashing Kernel Mmgetsystemroutineaddress Replacement String Hashing Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Mmgetsystemroutineaddress Replacement with String Hashing Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/mmgetsystemroutineaddress-replacement-with-string-hashing-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/mmgetsystemroutineaddress-replacement-with-string-hashing-kernel/</guid><description>Mmgetsystemroutineaddress Replacement with String Hashing Kernel Mmgetsystemroutineaddress Replacement with String Hashing Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>ModelForms</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/modelforms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/modelforms/</guid><description>ModelForms ModelForms - automatically generated forms tied to Django models for streamlined create and update operations.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>Models and ORM</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/models-and-orm/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/models-and-orm/</guid><description>Models and ORM Models and ORM - defining database schema as Python classes and querying with Django&amp;rsquo;s object-relational mapper.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>Module Overloading</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/module-overloading/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/module-overloading/</guid><description>Module Overloading Module Overloading - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Module Stomping</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/module-stomping/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/module-stomping/</guid><description>Module Stomping Module Stomping - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Monitoring and Observability</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/observability-and-sre/monitoring-and-observability/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/observability-and-sre/monitoring-and-observability/</guid><description>Monitoring and Observability Monitoring and Observability - using metrics, logs, and distributed traces to understand and diagnose system behavior.
Related Links: Incident Management for SRE Monitoring Tools Observability Fundamentals SLI SLO SLA</description></item><item><title>Monitoring Display State Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/monitoring-display-state-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/monitoring-display-state-kernel/</guid><description>Monitoring Display State Kernel Monitoring Display State Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Monitoring Tools</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/observability-and-sre/monitoring-tools/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/observability-and-sre/monitoring-tools/</guid><description>Monitoring Tools Monitoring Tools - platforms such as Grafana, Prometheus, Datadog, New Relic, and Splunk for metrics collection and alerting.
Related Links: Incident Management for SRE Monitoring and Observability Observability Fundamentals SLI SLO SLA</description></item><item><title>Monitoring User Presence Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/monitoring-user-presence-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/monitoring-user-presence-kernel/</guid><description>Monitoring User Presence Kernel Monitoring User Presence Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Monodon Firmware</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/monodon-firmware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/monodon-firmware/</guid><description>Monodon Firmware Monodon Firmware - firmware implementation and protocol details for the Monodon communication stack.
Related Links: CAN Bus I2C SPI UART</description></item><item><title>Monolith</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/monolith/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/monolith/</guid><description>Monolith Monolith - single-tiered software application where all components are tightly coupled into one codebase.
Related Links: Architectural patterns Backend Architecture Microservices Monolith vs Microservices Serverless Serverless computing Service mesh architecture Service meshes Service-oriented architecture (SOA) Twelve-factor app</description></item><item><title>Monolith vs Microservices</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/monolith-vs-microservices/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/monolith-vs-microservices/</guid><description>Monolith vs Microservices Monolith vs Microservices - comparison of monolithic and microservice architectural approaches and trade-offs.
Related Links: Architectural patterns Backend Architecture Microservices Monolith Serverless Serverless computing Service mesh architecture Service meshes Service-oriented architecture (SOA) Twelve-factor app</description></item><item><title>Monotonic Stack</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/monotonic-stack/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/monotonic-stack/</guid><description>Monotonic Stack Monotonic Stack - stack maintaining elements in monotonic order to solve next greater or smaller element problems in O(n).
Related Links: BFS Pattern Binary Search Pattern DFS Pattern Fast and Slow Pointers Merge Intervals Sliding Window Top K Elements Two Pointers Union Find</description></item><item><title>More C Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/more-c-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/more-c-fundamentals/</guid><description>More C Fundamentals More C Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>MOTW Bypass via FileFix Variations</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/motw-bypass-via-filefix-variations/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/motw-bypass-via-filefix-variations/</guid><description>MOTW Bypass via FileFix Variations MOTW Bypass via FileFix Variations - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing and Evading SmuggleShield HTML Smuggling HTML Smuggling Strategies Integrating Anti-Bot with HTML Smuggling SVG Smuggling WebAssembly Smuggling</description></item><item><title>Move File to Startup Folder</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/move-file-to-startup-folder/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/move-file-to-startup-folder/</guid><description>Move File to Startup Folder Move File to Startup Folder - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item><item><title>MPU Usage Patterns</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/mpu-usage-patterns/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/mpu-usage-patterns/</guid><description>MPU Usage Patterns MPU Usage Patterns - common configurations of the Cortex-M Memory Protection Unit to enforce privilege separation, protect stack regions, and prevent unauthorized memory access.
Related Links: Boot Flow on Cortex-M Exceptions Interruptions NVIC TrustZone-M</description></item><item><title>MS-RPRN Abuse</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/ms-rprn-abuse/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/ms-rprn-abuse/</guid><description>MS-RPRN Abuse MS-RPRN Abuse - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>MsgWaitForMultipleObjectsEx Alertable Function</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/msgwaitformultipleobjectsex-alertable-function/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/msgwaitformultipleobjectsex-alertable-function/</guid><description>MsgWaitForMultipleObjectsEx Alertable Function MsgWaitForMultipleObjectsEx Alertable Function - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Multi-factor authentication (MFA)</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/multi-factor-authentication-mfa/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/multi-factor-authentication-mfa/</guid><description>Multi-factor authentication (MFA) Multi-Factor Authentication - security process requiring two or more verification methods to authenticate users.
Related Links: Authentication and Authorization AuthN vs AuthZ Password-based authentication Session and Token Security Token-based authentication</description></item><item><title>Multiple Alertable Functions</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/multiple-alertable-functions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/multiple-alertable-functions/</guid><description>Multiple Alertable Functions Multiple Alertable Functions - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Named Pipes PowerShell Execution via .</description></item><item><title>Multiple Anti-Debugging Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/multiple-anti-debugging-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/multiple-anti-debugging-techniques/</guid><description>Multiple Anti-Debugging Techniques Multiple Anti-Debugging Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Multiple Anti-Debugging Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/multiple-anti-debugging-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/multiple-anti-debugging-techniques/</guid><description>Multiple Anti-Debugging Techniques Multiple Anti-Debugging Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Multiple Function Replacements</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/multiple-function-replacements/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/multiple-function-replacements/</guid><description>Multiple Function Replacements Multiple Function Replacements - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Multiple GetModuleHandle Replacement Functions</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/multiple-getmodulehandle-replacement-functions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/multiple-getmodulehandle-replacement-functions/</guid><description>Multiple GetModuleHandle Replacement Functions Multiple GetModuleHandle Replacement Functions - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Multiple Hashing Algorithms</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/hashing/multiple-hashing-algorithms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/hashing/multiple-hashing-algorithms/</guid><description>Multiple Hashing Algorithms Multiple Hashing Algorithms - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: CRC DJB2 Lose Lose Hashing Algorithms Hashing Fundamentals</description></item><item><title>Multiple Payload Execution Control Methods</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/multiple-payload-execution-control-methods/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/multiple-payload-execution-control-methods/</guid><description>Multiple Payload Execution Control Methods Multiple Payload Execution Control Methods - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>MurmurHash3 String Hashing Algorithm</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/murmurhash3-string-hashing-algorithm/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/murmurhash3-string-hashing-algorithm/</guid><description>MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>MurmurHash3 String Hashing Algorithm ASCII</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/murmurhash3-string-hashing-algorithm-ascii/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/murmurhash3-string-hashing-algorithm-ascii/</guid><description>MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Algorithm ASCII - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>MurmurHash3 String Hashing Syscalls Hash Values NT</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/murmurhash3-string-hashing-syscalls-hash-values-nt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/murmurhash3-string-hashing-syscalls-hash-values-nt/</guid><description>MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 String Hashing Syscalls Hash Values NT - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>MurmurHash3 Syscalls Hash Values ZW</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/murmurhash3-syscalls-hash-values-zw/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/murmurhash3-syscalls-hash-values-zw/</guid><description>MurmurHash3 Syscalls Hash Values ZW MurmurHash3 Syscalls Hash Values ZW - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>MurmurHash3 WinAPIs Hash Values</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/murmurhash3-winapis-hash-values/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/murmurhash3-winapis-hash-values/</guid><description>MurmurHash3 WinAPIs Hash Values MurmurHash3 WinAPIs Hash Values - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>N+1 query problem</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/n+1-query-problem/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/n+1-query-problem/</guid><description>N+1 query problem N+1 Query Problem - performance antipattern causing excessive database queries in ORM-based code.
Related Links: Data replication Database index Database scaling Indexes and performance optimization Indexing and Query Performance Performance tuning and query optimization Sharding</description></item><item><title>Named Pipes</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/named-pipes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/named-pipes/</guid><description>Named Pipes Named Pipes - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions PowerShell Execution via .</description></item><item><title>Near-Field Communication (NFC) Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/near-field-communication-nfc-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/near-field-communication-nfc-exploits/</guid><description>Near-Field Communication (NFC) Exploits Near-Field Communication (NFC) Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Acoustic Communication Exploits Bluetooth Exploits Deauth Evil Twin Attacks Infrared Exploits Power Line Communication Exploits Quantum Communication Exploits Radio Frequency Exploits Rogue Access Point Satellite Communication Exploits Ultrasonic Communication Exploits Visible Light Communication Exploits WiFi Exploits</description></item><item><title>NET Assemblies Patching SystemEnvironment.Exit</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/net-assemblies-patching-systemenvironment.exit/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/net-assemblies-patching-systemenvironment.exit/</guid><description>NET Assemblies Patching SystemEnvironment.Exit NET Assemblies Patching SystemEnvironment.Exit - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Network Attacks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/</guid><description>Network Attacks Network Attacks - offensive techniques targeting network infrastructure, protocols, and data in transit to intercept, disrupt, or manipulate communications.
DNS Poisoning MITM Network Attacks Overview Packet Sniffing Exploits Spoofing VLAN Hopping VMescape Exploits Related Links: DNS Lookup Host Check ICMP Echo Network Evasion Techniques Network Protocols Port Scanning TCP Port Scan VPNs Wireless and Physical Attacks</description></item><item><title>Network Attacks</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/network-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/network-attacks/</guid><description>Network Attacks Network Attacks - exploitation techniques targeting network-connected embedded systems through protocol vulnerabilities, unauthenticated services, or traffic interception.
Related Links: Buffer Overflow Firmware Exploitation Physical Attacks Side-Channel Attacks</description></item><item><title>Network Attacks Overview</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/network-attacks-overview/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/network-attacks-overview/</guid><description>Network Attacks Overview Network Attacks Overview - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Poisoning MITM Packet Sniffing Exploits Spoofing VLAN Hopping VMescape Exploits</description></item><item><title>Network Evasion Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-evasion-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-evasion-techniques/</guid><description>Network Evasion Techniques Network Evasion Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Lookup Host Check ICMP Echo Network Attacks Network Protocols Port Scanning TCP Port Scan VPNs Wireless and Physical Attacks</description></item><item><title>Network Evasion Techniques Overview</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/network-evasion-techniques-overview/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/network-evasion-techniques-overview/</guid><description>Network Evasion Techniques Overview Network Evasion Techniques Overview - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Network Forensics with Wireshark</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/wireshark/network-forensics-with-wireshark/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/wireshark/network-forensics-with-wireshark/</guid><description>Network Forensics with Wireshark Network Forensics with Wireshark - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Protocol Analysis Tcpdump Wireshark Fundamentals</description></item><item><title>Network Protocols</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-protocols/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-protocols/</guid><description>Network Protocols Network Protocols - core networking standards and protocols that define how data is transmitted and received across computer networks.
DNS Handshakes HTTPS Networking Networking Fundamentals Subnetting Related Links: DNS Lookup Host Check ICMP Echo Network Attacks Network Evasion Techniques Port Scanning TCP Port Scan VPNs Wireless and Physical Attacks</description></item><item><title>Network Security</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/</guid><description>Network Security Network Security - the practices and technologies used to protect network infrastructure, data in transit, and communication channels from unauthorized access and attacks.
DNS Lookup Host Check ICMP Echo Network Attacks Network Evasion Techniques Network Protocols Port Scanning TCP Port Scan VPNs Wireless and Physical Attacks Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Network Segmentation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/network-segmentation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/network-segmentation/</guid><description>Network Segmentation Network Segmentation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DMZ Firewalls Overview Honeypots Jump Server Microsegmentation Port Blocking Zero Trust Architecture</description></item><item><title>Networking</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-protocols/networking/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-protocols/networking/</guid><description>Networking Networking - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Handshakes HTTPS Networking Fundamentals Subnetting</description></item><item><title>Networking Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-protocols/networking-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-protocols/networking-fundamentals/</guid><description>Networking Fundamentals Networking Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Handshakes HTTPS Networking Subnetting</description></item><item><title>Nginx</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/nginx/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/nginx/</guid><description>Nginx Nginx - a high-performance web server, reverse proxy, and load balancer widely used in phishing infrastructure, C2 redirectors, and web application delivery.
Introduction to Nginx Capabilities Nginx Demo Reverse Proxying Nginx Fundamentals Protecting Phishing Servers via Nginx Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Nginx Demo Reverse Proxying</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/nginx/nginx-demo-reverse-proxying/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/nginx/nginx-demo-reverse-proxying/</guid><description>Nginx Demo Reverse Proxying Nginx Demo Reverse Proxying - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Introduction to Nginx Capabilities Nginx Fundamentals Protecting Phishing Servers via Nginx</description></item><item><title>Nginx Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/nginx-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/nginx-fundamentals/</guid><description>Nginx Fundamentals Nginx Fundamentals - core configuration and usage of Nginx as a reverse proxy and web server.
Related Links: Apache Caddy Domain name Domain name system Http caching Https Web servers</description></item><item><title>Nginx Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/nginx/nginx-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/nginx/nginx-fundamentals/</guid><description>Nginx Fundamentals Nginx Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Introduction to Nginx Capabilities Nginx Demo Reverse Proxying Protecting Phishing Servers via Nginx</description></item><item><title>Nikto</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/nikto/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/nikto/</guid><description>Nikto Nikto - open-source web server scanner that detects dangerous files, outdated software, and server misconfigurations.
Related Links: API Security Arachni Dynamic application security testing (DAST) Pipeline Security Shift Left Security Software composition analysis (SCA) Static application security testing (SAST) W3af</description></item><item><title>Nmap</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/nmap/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/nmap/</guid><description>Nmap Nmap - a powerful open-source network scanner used for host discovery, port scanning, service version detection, and OS fingerprinting.
Nmap Fundamentals Nmap NSE Scripts Port Scanning Techniques Service Detection Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Nmap Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/nmap/nmap-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/nmap/nmap-fundamentals/</guid><description>Nmap Fundamentals Nmap Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Nmap NSE Scripts Port Scanning Techniques Service Detection</description></item><item><title>Nmap NSE Scripts</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/nmap/nmap-nse-scripts/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/nmap/nmap-nse-scripts/</guid><description>Nmap NSE Scripts Nmap NSE Scripts - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Nmap Fundamentals Port Scanning Techniques Service Detection</description></item><item><title>Non-relational databases</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/non-relational-databases/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/non-relational-databases/</guid><description>Non-relational databases Non-Relational Databases - databases that do not use the tabular schema of relational systems.
Related Links: Column dbs Document dbs Elasticsearch Graphdbs Key value Memcached NoSQL databases Redis Relational databases Search engines Solr Time series dbs Vector databases</description></item><item><title>Normalization</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/normalization/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/normalization/</guid><description>Normalization Normalization - process of organizing database schema to reduce redundancy and improve data integrity.
Related Links: ACID CAP theorem Data constraints Data definition language Data integrity and normalization and security Data manipulation language Databases and Data Modeling Migrations ORMs Transactions Transactions and isolation levels</description></item><item><title>NoSQL databases</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/nosql-databases/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/nosql-databases/</guid><description>NoSQL databases NoSQL Databases - non-relational databases designed for flexible schema, horizontal scale, and performance.
Related Links: Column dbs Document dbs Elasticsearch Graphdbs Key value Memcached Non-relational databases Redis Relational databases Search engines Solr Time series dbs Vector databases</description></item><item><title>NTDLL Unhooking</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/ntdll-unhooking/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/ntdll-unhooking/</guid><description>NTDLL Unhooking NTDLL Unhooking - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Variants Hardware Hooks NTDLL Unhooking Variants Unhooking All DLLs Utilizing Hardware Breakpoints for Hooking 1 Utilizing Hardware Breakpoints for Hooking 2</description></item><item><title>NTDLL Unhooking and API Hooking</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/</guid><description>NTDLL Unhooking and API Hooking NTDLL Unhooking and API Hooking - techniques to restore hooked NTDLL functions or intercept API calls to bypass EDR user-mode hooks.
API Hooking Variants Hardware Hooks NTDLL Unhooking NTDLL Unhooking Variants Unhooking All DLLs Utilizing Hardware Breakpoints for Hooking 1 Utilizing Hardware Breakpoints for Hooking 2 Related Links: AMSI Bypass Anti-Analysis Automated Obfuscation Techniques Code Obfuscation Covering Tracks ETW Bypass</description></item><item><title>NTDLL Unhooking Variants</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/ntdll-unhooking-variants/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/ntdll-unhooking-variants/</guid><description>NTDLL Unhooking Variants NTDLL Unhooking Variants - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Variants Hardware Hooks NTDLL Unhooking Unhooking All DLLs Utilizing Hardware Breakpoints for Hooking 1 Utilizing Hardware Breakpoints for Hooking 2</description></item><item><title>NVIC</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/nvic/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/nvic/</guid><description>NVIC NVIC - the Nested Vectored Interrupt Controller on Cortex-M that manages interrupt priority, enabling, pending state, and vectored dispatch to handler functions.
Related Links: Boot Flow on Cortex-M Exceptions Interruptions MPU Usage Patterns TrustZone-M</description></item><item><title>OAuth</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/oauth/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/oauth/</guid><description>OAuth OAuth - open standard authorization framework enabling secure delegated access to user resources.
Related Links: Access control lists (ACLs) Attribute-based access control (ABAC) Capability-based access control OpenID Connect (OIDC) Role-based access control (RBAC)</description></item><item><title>Obfuscation and Detection Evasion</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/</guid><description>Obfuscation and Detection Evasion Obfuscation and Detection Evasion - techniques used to conceal malicious code and behavior from security tools, analysts, and automated detection systems.
AMSI Bypass Anti-Analysis Automated Obfuscation Techniques Code Obfuscation Covering Tracks ETW Bypass NTDLL Unhooking and API Hooking Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/obfuscation-ipv4fuscation-ipv6fuscation-uuidfuscation-macfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/obfuscation-ipv4fuscation-ipv6fuscation-uuidfuscation-macfuscation/</guid><description>Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Object File Loader with Module Stomping</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/beacon-object-files-bof/object-file-loader-with-module-stomping/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/beacon-object-files-bof/object-file-loader-with-module-stomping/</guid><description>Object File Loader with Module Stomping Object File Loader with Module Stomping - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: BOF Execution Introduction to BOF LSASS Dump BOF Threadless Shellcode Injection via HWBPs BOF Writing BOF Files</description></item><item><title>Observability and SRE</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/observability-and-sre/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/observability-and-sre/</guid><description>Observability and SRE Observability and SRE - monitoring, reliability engineering, and incident management for production systems.
Incident Management for SRE Monitoring and Observability Monitoring Tools Observability Fundamentals SLI SLO SLA Related Links: CI-CD Containers and Kubernetes DevOps and Platform Engineering Infrastructure as Code</description></item><item><title>Observability Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/observability-and-sre/observability-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/observability-and-sre/observability-fundamentals/</guid><description>Observability Fundamentals Observability Fundamentals - the three pillars of metrics, logs, and traces and how they enable system insight and diagnosis.
Related Links: Incident Management for SRE Monitoring and Observability Monitoring Tools SLI SLO SLA</description></item><item><title>Offensive Phishing Operations</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/</guid><description>Offensive Phishing Operations Offensive Phishing Operations - the planning, infrastructure, and execution of phishing campaigns to harvest credentials and deliver payloads in controlled engagements.
AitM and MFA Bypass Anti-Bot Email Attachments and Phishing Campaigns HTML Smuggling Infrastructure Introduction to Phishing Page Design and Delivery Phishing Anti-Analysis Phishing Requirements Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Open a Domain MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/open-a-domain-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/open-a-domain-ms-samr/</guid><description>Open a Domain MS-SAMR Open a Domain MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Open a Group MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/open-a-group-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/open-a-group-ms-samr/</guid><description>Open a Group MS-SAMR Open a Group MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Open a User Account MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/open-a-user-account-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/open-a-user-account-ms-samr/</guid><description>Open a User Account MS-SAMR Open a User Account MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Open an Alias MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/open-an-alias-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/open-an-alias-ms-samr/</guid><description>Open an Alias MS-SAMR Open an Alias MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Open API Specification (OAS)</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/open-api-specification-oas/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/open-api-specification-oas/</guid><description>Open API Specification (OAS) Open API Specification - standard, language-agnostic interface description format for RESTful APIs.
Related Links: API API Design API styles GraphQL GraphQL Fundamentals GRPC HTTP and API Fundamentals REST REST API Design SOAP</description></item><item><title>Open LSAD Policy Handle MS-LSAD</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/open-lsad-policy-handle-ms-lsad/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/open-lsad-policy-handle-ms-lsad/</guid><description>Open LSAD Policy Handle MS-LSAD Open LSAD Policy Handle MS-LSAD - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>OpenID Connect (OIDC)</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/openid-connect-oidc/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/openid-connect-oidc/</guid><description>OpenID Connect (OIDC) OpenID Connect - identity layer built on OAuth 2.0 for authentication and user identity verification.
Related Links: Access control lists (ACLs) Attribute-based access control (ABAC) Capability-based access control OAuth Role-based access control (RBAC)</description></item><item><title>Operating Systems for Privacy</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/operating-systems-for-privacy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/operating-systems-for-privacy/</guid><description>Operating Systems for Privacy Operating Systems for Privacy - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Privacy Techniques Privacy-Focused Cloud Storage Providers Privacy-Focused Email Providers Privacy-Focused Hardware Devices Privacy-Focused Messaging Apps Privacy-Focused Operating Systems Privacy-Focused Search Engines Privacy-Focused Social Media Platforms Privacy-Focused Software Applications Privacy-Focused VPN Providers Privacy-Focused Web Browsers</description></item><item><title>OPSEC Failure Directory Listing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/opsec-failure-directory-listing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/opsec-failure-directory-listing/</guid><description>OPSEC Failure Directory Listing OPSEC Failure Directory Listing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>ORMs</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/orms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/orms/</guid><description>ORMs ORMs - libraries mapping database tables to object-oriented code for convenient database interaction.
Related Links: ACID CAP theorem Data constraints Data definition language Data integrity and normalization and security Data manipulation language Databases and Data Modeling Migrations Normalization Transactions Transactions and isolation levels</description></item><item><title>OSINT</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/threat-modeling/osint/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/threat-modeling/osint/</guid><description>OSINT OSINT - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APT Reconnaissance Techniques Supply Chain Attacks Threat Modeling Fundamentals Zero Day</description></item><item><title>OWASP risks</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/owasp-risks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/owasp-risks/</guid><description>OWASP risks OWASP Risks - top ten web application security risks identified by the Open Web Application Security Project.
Related Links: API security best practices Container security best practices CORS CSP Mitigation techniques Server security</description></item><item><title>OWASP Top 10</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/owasp-top-10/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/owasp-top-10/</guid><description>OWASP Top 10 OWASP Top 10 - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks</description></item><item><title>Packet Sniffing Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/packet-sniffing-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/packet-sniffing-exploits/</guid><description>Packet Sniffing Exploits Packet Sniffing Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Poisoning MITM Network Attacks Overview Spoofing VLAN Hopping VMescape Exploits</description></item><item><title>Page Design and Delivery</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/page-design-and-delivery/</guid><description>Page Design and Delivery Page Design and Delivery - techniques for creating convincing phishing pages, cloning legitimate sites, and delivering payloads via ClickFix and other vectors.
ClickFix Run Dialog Alternatives Cloning Websites via Browser Extension Designing Custom Phishing Pages Integrating Backend Functionality Introduction to Apache Mod Rewrite Introduction to ClickFix Introduction to Flask Living Off Trusted Sites (LOTS) Related Links: AitM and MFA Bypass Anti-Bot Email Attachments and Phishing Campaigns HTML Smuggling Infrastructure Introduction to Phishing Phishing Anti-Analysis Phishing Requirements</description></item><item><title>Pass the Hash</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/pass-the-hash/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/pass-the-hash/</guid><description>Pass the Hash Pass the Hash - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Active Directory Fundamentals Group Administration IAM Policies Identity and Access Management Fundamentals Identity Federation Privileged Access Management User Administration</description></item><item><title>Password-based authentication</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/password-based-authentication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/password-based-authentication/</guid><description>Password-based authentication Password-Based Authentication - authentication mechanism using secret credentials known only to the user.
Related Links: Authentication and Authorization AuthN vs AuthZ Multi-factor authentication (MFA) Session and Token Security Token-based authentication</description></item><item><title>Patching the .NET Exit Routine</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/patching-the-.net-exit-routine/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/patching-the-.net-exit-routine/</guid><description>Patching the .NET Exit Routine Patching the .NET Exit Routine - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Patchless AMSI Bypass via Hardware Breakpoints</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/amsi-bypass/patchless-amsi-bypass-via-hardware-breakpoints/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/amsi-bypass/patchless-amsi-bypass-via-hardware-breakpoints/</guid><description>Patchless AMSI Bypass via Hardware Breakpoints Patchless AMSI Bypass via Hardware Breakpoints - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AMSI Bypass Byte Patching AMSI Evasion AMSI Evasion via Hardware Breakpoint Hooks AMSI Evasion via Patching Introduction to AMSI</description></item><item><title>Patchless ETW Bypass via Hardware Breakpoints</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/patchless-etw-bypass-via-hardware-breakpoints/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/etw-bypass/patchless-etw-bypass-via-hardware-breakpoints/</guid><description>Patchless ETW Bypass via Hardware Breakpoints Patchless ETW Bypass via Hardware Breakpoints - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: ETW Bypass Byte Patching ETW Bypass Improved Patching ETW Discovering ETW Tools ETW Evasion ETW Evasion via NtTraceEvent Patching ETW Evasion via Patching ETW Evasion via Patching EtwpEventWrite ETW Evasion via Patching EtwpEventWrite v2 ETW Evasion via WinAPIs Patching ETW Provider Session Hijacking Introduction to ETW</description></item><item><title>Patchless Threadless Injection via Hardware Breakpoints</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/patchless-threadless-injection-via-hardware-breakpoints/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/patchless-threadless-injection-via-hardware-breakpoints/</guid><description>Patchless Threadless Injection via Hardware Breakpoints Patchless Threadless Injection via Hardware Breakpoints - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Patterns</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/</guid><description>Patterns Patterns - common problem-solving patterns used in technical interviews, with Python 3 solution templates.
BFS Pattern Binary Search Pattern DFS Pattern Fast and Slow Pointers Merge Intervals Monotonic Stack Sliding Window Top K Elements Two Pointers Union Find Related Links: Algorithms Data Structures</description></item><item><title>Payload and PE</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/</guid><description>Payload and PE Payload and PE - techniques for building, loading, and executing shellcode and PE-format payloads in offensive security implants.
APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Payload Encryption Variants</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-encryption-variants/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-encryption-variants/</guid><description>Payload Encryption Variants Payload Encryption Variants - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Payload Execution Control</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-control/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-control/</guid><description>Payload Execution Control Payload Execution Control - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution Control via Events</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-control-via-events/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-control-via-events/</guid><description>Payload Execution Control via Events Payload Execution Control via Events - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution Control via Mutexes</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-control-via-mutexes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-control-via-mutexes/</guid><description>Payload Execution Control via Mutexes Payload Execution Control via Mutexes - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution Control via Semaphores</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-control-via-semaphores/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-control-via-semaphores/</guid><description>Payload Execution Control via Semaphores Payload Execution Control via Semaphores - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via Callbacks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-callbacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-callbacks/</guid><description>Payload Execution via Callbacks Payload Execution via Callbacks - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via CertEnumSystemStore Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-certenumsystemstore-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-certenumsystemstore-callback/</guid><description>Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStore Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via CertEnumSystemStoreLocation Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-certenumsystemstorelocation-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-certenumsystemstorelocation-callback/</guid><description>Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CertEnumSystemStoreLocation Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via CopyFileExW Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-copyfileexw-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-copyfileexw-callback/</guid><description>Payload Execution via CopyFileExW Callback Payload Execution via CopyFileExW Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via CryptEnumOIDInfo Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-cryptenumoidinfo-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-cryptenumoidinfo-callback/</guid><description>Payload Execution via CryptEnumOIDInfo Callback Payload Execution via CryptEnumOIDInfo Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumCalendarInfoW Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumcalendarinfow-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumcalendarinfow-callback/</guid><description>Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumCalendarInfoW Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumDesktopsW Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumdesktopsw-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumdesktopsw-callback/</guid><description>Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopsW Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumDesktopWindows Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumdesktopwindows-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumdesktopwindows-callback/</guid><description>Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDesktopWindows Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumDirTreeW Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumdirtreew-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumdirtreew-callback/</guid><description>Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDirTreeW Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumDisplayMonitors Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumdisplaymonitors-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumdisplaymonitors-callback/</guid><description>Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumDisplayMonitors Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumerateLoadedModules Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumerateloadedmodules-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumerateloadedmodules-callback/</guid><description>Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumerateLoadedModules Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumFontFamiliesW Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumfontfamiliesw-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumfontfamiliesw-callback/</guid><description>Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontFamiliesW Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumFontsW Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumfontsw-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumfontsw-callback/</guid><description>Payload Execution via EnumFontsW Callback Payload Execution via EnumFontsW Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumLanguageGroupLocalesW Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumlanguagegrouplocalesw-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumlanguagegrouplocalesw-callback/</guid><description>Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumLanguageGroupLocalesW Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumObjects Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumobjects-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumobjects-callback/</guid><description>Payload Execution via EnumObjects Callback Payload Execution via EnumObjects Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumPageFilesW Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumpagefilesw-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumpagefilesw-callback/</guid><description>Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPageFilesW Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumPropsW Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumpropsw-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumpropsw-callback/</guid><description>Payload Execution via EnumPropsW Callback Payload Execution via EnumPropsW Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumPwrSchemes Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumpwrschemes-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumpwrschemes-callback/</guid><description>Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumPwrSchemes Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumResourceTypesW Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumresourcetypesw-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumresourcetypesw-callback/</guid><description>Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumResourceTypesW Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumSystemLocalesEx Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumsystemlocalesex-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumsystemlocalesex-callback/</guid><description>Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumSystemLocalesEx Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumThreadWindows Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumthreadwindows-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumthreadwindows-callback/</guid><description>Payload Execution via EnumThreadWindows Callback Payload Execution via EnumThreadWindows Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumTimeFormatsEx Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumtimeformatsex-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumtimeformatsex-callback/</guid><description>Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumTimeFormatsEx Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumWindows Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumwindows-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumwindows-callback/</guid><description>Payload Execution via EnumWindows Callback Payload Execution via EnumWindows Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via EnumWindowStationsW Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumwindowstationsw-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-enumwindowstationsw-callback/</guid><description>Payload Execution via EnumWindowStationsW Callback Payload Execution via EnumWindowStationsW Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via Fibers</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-fibers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-fibers/</guid><description>Payload Execution via Fibers Payload Execution via Fibers - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via FlsAlloc Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-flsalloc-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-flsalloc-callback/</guid><description>Payload Execution via FlsAlloc Callback Payload Execution via FlsAlloc Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via ImageGetDigestStream Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-imagegetdigeststream-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-imagegetdigeststream-callback/</guid><description>Payload Execution via ImageGetDigestStream Callback Payload Execution via ImageGetDigestStream Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via ImmEnumInputContext Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-immenuminputcontext-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-immenuminputcontext-callback/</guid><description>Payload Execution via ImmEnumInputContext Callback Payload Execution via ImmEnumInputContext Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via InitOnceExecuteOnce Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-initonceexecuteonce-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-initonceexecuteonce-callback/</guid><description>Payload Execution via InitOnceExecuteOnce Callback Payload Execution via InitOnceExecuteOnce Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via SymEnumProcesses Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-symenumprocesses-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-symenumprocesses-callback/</guid><description>Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumProcesses Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via SymEnumSourceFiles Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-symenumsourcefiles-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-symenumsourcefiles-callback/</guid><description>Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymEnumSourceFiles Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Execution via SymFindFileInPath Callback</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-symfindfileinpath-callback/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/payload-execution-via-symfindfileinpath-callback/</guid><description>Payload Execution via SymFindFileInPath Callback Payload Execution via SymFindFileInPath Callback - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Payload Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-injection/</guid><description>Payload Injection Payload Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Payload Obfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/payload-obfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/payload-obfuscation/</guid><description>Payload Obfuscation Payload Obfuscation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Payload Obfuscation and Deobfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-obfuscation-and-deobfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-obfuscation-and-deobfuscation/</guid><description>Payload Obfuscation and Deobfuscation Payload Obfuscation and Deobfuscation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Payload Obfuscation Variants</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-obfuscation-variants/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-obfuscation-variants/</guid><description>Payload Obfuscation Variants Payload Obfuscation Variants - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Payload Placement</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-placement/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-placement/</guid><description>Payload Placement Payload Placement - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Payload Placement Variants</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-placement-variants/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-placement-variants/</guid><description>Payload Placement Variants Payload Placement Variants - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Payload Staging</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-staging/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-staging/</guid><description>Payload Staging Payload Staging - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Payload Staging via Registry and Web</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-staging-via-registry-and-web/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/payload-staging-via-registry-and-web/</guid><description>Payload Staging via Registry and Web Payload Staging via Registry and Web - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>PEB LDR Data Iterator</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/peb-ldr-data-iterator/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/peb-ldr-data-iterator/</guid><description>PEB LDR Data Iterator PEB LDR Data Iterator - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>PEfluctuation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/pefluctuation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/pefluctuation/</guid><description>PEfluctuation PEfluctuation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ekko Sleep Obfuscation with Control Flow Guard Ekko Sleep Obfuscation with Restored File Section Protections Ekko Sleep Obfuscation with RtlEncryptMemory and RtlDecryptMemory Ekko Sleep Obfuscation with Stack Spoofing Heap Encryption with Ekko Sleep Obfuscation Introduction to Ekko Sleep Obfuscation Introduction to Foliage Sleep Obfuscation Introduction to Sleep Obfuscation Zilean Sleep Obfuscation with Stack Duplication</description></item><item><title>Performance tuning and query optimization</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/performance-tuning-and-query-optimization/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/performance-tuning-and-query-optimization/</guid><description>Performance tuning and query optimization Performance Tuning and Query Optimization - techniques for improving database query speed and resource efficiency.
Related Links: Data replication Database index Database scaling Indexes and performance optimization Indexing and Query Performance N+1 query problem Sharding</description></item><item><title>Performing Input Validation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/performing-input-validation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/performing-input-validation/</guid><description>Performing Input Validation Performing Input Validation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Permissions</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/permissions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/permissions/</guid><description>Permissions Permissions - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Permissions and Groups</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/permissions-and-groups/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/permissions-and-groups/</guid><description>Permissions and Groups Permissions and Groups - Django&amp;rsquo;s per-model permission system and group-based access control for views and objects.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>Persistence</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/</guid><description>Persistence Persistence - techniques used by malware to maintain access to a compromised system across reboots, logoffs, and security tool detections.
Abusing WMI for Persistence Introduction to Windows Persistence Persistence via COM Object Hijacking Persistence via Electron Applications Persistence via File System Persistence via Startup Folder Persistence via Windows Registry Persistence via Windows Services Persistence via Windows Tasks Related Links: Beacon Object Files (BOF) C2 and Networking Credential Dumping Malware Concepts Payload and PE Process Injection Sleep Obfuscation Windows Internals</description></item><item><title>Persistence Techniques Overview</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/persistence-techniques-overview/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/persistence-techniques-overview/</guid><description>Persistence Techniques Overview Persistence Techniques Overview - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Persistence via COM Object Hijacking</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-com-object-hijacking/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-com-object-hijacking/</guid><description>Persistence via COM Object Hijacking Persistence via COM Object Hijacking - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Abusing WMI for Persistence Introduction to Windows Persistence Persistence via Electron Applications Persistence via File System Persistence via Startup Folder Persistence via Windows Registry Persistence via Windows Services Persistence via Windows Tasks</description></item><item><title>Persistence via Electron Applications</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-electron-applications/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-electron-applications/</guid><description>Persistence via Electron Applications Persistence via Electron Applications - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Abusing WMI for Persistence Introduction to Windows Persistence Persistence via COM Object Hijacking Persistence via File System Persistence via Startup Folder Persistence via Windows Registry Persistence via Windows Services Persistence via Windows Tasks</description></item><item><title>Persistence via File System</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-file-system/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-file-system/</guid><description>Persistence via File System Persistence via File System - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Abusing WMI for Persistence Introduction to Windows Persistence Persistence via COM Object Hijacking Persistence via Electron Applications Persistence via Startup Folder Persistence via Windows Registry Persistence via Windows Services Persistence via Windows Tasks</description></item><item><title>Persistence via Startup Folder</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-startup-folder/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-startup-folder/</guid><description>Persistence via Startup Folder Persistence via Startup Folder - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Abusing WMI for Persistence Introduction to Windows Persistence Persistence via COM Object Hijacking Persistence via Electron Applications Persistence via File System Persistence via Windows Registry Persistence via Windows Services Persistence via Windows Tasks</description></item><item><title>Persistence via Startup Folder</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/persistence-via-startup-folder/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/persistence-via-startup-folder/</guid><description>Persistence via Startup Folder Persistence via Startup Folder - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item><item><title>Persistence via Windows Registry</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-windows-registry/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-windows-registry/</guid><description>Persistence via Windows Registry Persistence via Windows Registry - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Abusing WMI for Persistence Introduction to Windows Persistence Persistence via COM Object Hijacking Persistence via Electron Applications Persistence via File System Persistence via Startup Folder Persistence via Windows Services Persistence via Windows Tasks</description></item><item><title>Persistence via Windows Services</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-windows-services/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-windows-services/</guid><description>Persistence via Windows Services Persistence via Windows Services - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Abusing WMI for Persistence Introduction to Windows Persistence Persistence via COM Object Hijacking Persistence via Electron Applications Persistence via File System Persistence via Startup Folder Persistence via Windows Registry Persistence via Windows Tasks</description></item><item><title>Persistence via Windows Tasks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-windows-tasks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-windows-tasks/</guid><description>Persistence via Windows Tasks Persistence via Windows Tasks - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Abusing WMI for Persistence Introduction to Windows Persistence Persistence via COM Object Hijacking Persistence via Electron Applications Persistence via File System Persistence via Startup Folder Persistence via Windows Registry Persistence via Windows Services</description></item><item><title>Phases of DevOps</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devops-fundamentals/phases-of-devops/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devops-fundamentals/phases-of-devops/</guid><description>Phases of DevOps Phases of DevOps - the continuous loop of plan, code, build, test, release, deploy, operate, and monitor.
Related Links: Agile and Scrum DevOps and DevSecOps Fundamentals Software Delivery Models Waterfall vs Agile vs DevOps</description></item><item><title>Phishing Anti-Analysis</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/</guid><description>Phishing Anti-Analysis Phishing Anti-Analysis - techniques to detect and evade automated phishing page scanners, security analysts, and threat intelligence crawlers.
Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods Practical Phishing Detection Examples Related Links: AitM and MFA Bypass Anti-Bot Email Attachments and Phishing Campaigns HTML Smuggling Infrastructure Introduction to Phishing Page Design and Delivery Phishing Requirements</description></item><item><title>Phishing Detection Methods</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/phishing-detection-methods/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/phishing-detection-methods/</guid><description>Phishing Detection Methods Phishing Detection Methods - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Practical Phishing Detection Examples</description></item><item><title>Phishing Overview</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/digital-social-engineering/phishing-overview/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/digital-social-engineering/phishing-overview/</guid><description>Phishing Overview Phishing Overview - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Business Email Compromise Drive-By Downloads File Sharing and Removable Media Typo Squatting Watering Hole Attacks</description></item><item><title>Phishing Requirements</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-requirements/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-requirements/</guid><description>Phishing Requirements Phishing Requirements - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AitM and MFA Bypass Anti-Bot Email Attachments and Phishing Campaigns HTML Smuggling Infrastructure Introduction to Phishing Page Design and Delivery Phishing Anti-Analysis</description></item><item><title>Physical Attacks</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/physical-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/physical-attacks/</guid><description>Physical Attacks Physical Attacks - hardware-level attack techniques including fault injection, probe-based extraction, and physical tampering with embedded devices.
Related Links: Buffer Overflow Firmware Exploitation Network Attacks Side-Channel Attacks</description></item><item><title>Physical Social Engineering</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/physical-social-engineering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/physical-social-engineering/</guid><description>Physical Social Engineering Physical Social Engineering - in-person deception and manipulation techniques that exploit physical access, trust, and human behavior.
Dumpster Diving Impersonation Techniques Lock Picking Pretexting Related Links: Automated Social Engineering Techniques Automated Spear Phishing Email Generation Digital Social Engineering Social Engineering Fundamentals Social Engineering Techniques</description></item><item><title>Ping</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/linux-operating-system/ping/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/linux-operating-system/ping/</guid><description>Ping Ping - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ipconfig and Ifconfig Kali vs Parrot vs BlackArch vs Qubes Linux Fundamentals</description></item><item><title>Pipeline and Delivery</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/pipeline-and-delivery/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/pipeline-and-delivery/</guid><description>Pipeline and Delivery Pipeline and Delivery - CI/CD pipeline design, release strategies, and automated software delivery practices.
CI-CD Fundamentals Deployment Development Phase Release Strategies Requirements and Design Phase Testing Related Links: DevOps Fundamentals DevSecOps</description></item><item><title>Pipeline Security</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/pipeline-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/pipeline-security/</guid><description>Pipeline Security Pipeline Security - securing the CI/CD supply chain through secret management, artifact signing, and dependency scanning.
Related Links: API Security Arachni Dynamic application security testing (DAST) Nikto Shift Left Security Software composition analysis (SCA) Static application security testing (SAST) W3af</description></item><item><title>Pivot and unpivot operations</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/pivot-and-unpivot-operations/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/pivot-and-unpivot-operations/</guid><description>Pivot and unpivot operations Pivot and Unpivot Operations - SQL transformations rotating rows to columns or columns to rows.
Related Links: Advanced SQL Aggregate queries Common table expressions (CTEs) Dynamic SQL Join queries Recursive queries Select, insert, delete, update statements Stored procedures and triggers Subqueries Views Window functions</description></item><item><title>PJW String Hashing Algorithm</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/pjw-string-hashing-algorithm/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/pjw-string-hashing-algorithm/</guid><description>PJW String Hashing Algorithm PJW String Hashing Algorithm - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>PJW String Hashing Algorithm ASCII</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/pjw-string-hashing-algorithm-ascii/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/pjw-string-hashing-algorithm-ascii/</guid><description>PJW String Hashing Algorithm ASCII PJW String Hashing Algorithm ASCII - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>PJW String Hashing Syscalls Hash Values NT</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/pjw-string-hashing-syscalls-hash-values-nt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/pjw-string-hashing-syscalls-hash-values-nt/</guid><description>PJW String Hashing Syscalls Hash Values NT PJW String Hashing Syscalls Hash Values NT - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>PJW Syscalls Hash Values ZW</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/pjw-syscalls-hash-values-zw/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/pjw-syscalls-hash-values-zw/</guid><description>PJW Syscalls Hash Values ZW PJW Syscalls Hash Values ZW - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>PJW WinAPIs Hash Values</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/pjw-winapis-hash-values/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/pjw-winapis-hash-values/</guid><description>PJW WinAPIs Hash Values PJW WinAPIs Hash Values - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Platform Interrupt Architecture</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/platform-interrupt-architecture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/platform-interrupt-architecture/</guid><description>Platform Interrupt Architecture Platform Interrupt Architecture - the RISC-V PLIC and CLINT interrupt controllers that route external and timer interrupts to harts with configurable priority and threshold settings.
Related Links: PMP and Isolation Privilege Model and Trap Handling</description></item><item><title>PMP and Isolation</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/pmp-and-isolation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/pmp-and-isolation/</guid><description>PMP and Isolation PMP and Isolation - the RISC-V Physical Memory Protection unit used to restrict memory access by privilege level, enabling isolation between firmware components and sandboxing of untrusted code.
Related Links: Platform Interrupt Architecture Privilege Model and Trap Handling</description></item><item><title>Pointers and Casting in Embedded C</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/pointers-and-casting-in-embedded-c/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/pointers-and-casting-in-embedded-c/</guid><description>Pointers and Casting in Embedded C Pointers and Casting in Embedded C - pointer arithmetic, void pointers, and type casting used to access hardware registers and manipulate raw memory.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Polymorphic and Metamorphic Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/polymorphic-and-metamorphic-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/polymorphic-and-metamorphic-techniques/</guid><description>Polymorphic and Metamorphic Techniques Polymorphic and Metamorphic Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Polymorphic Malware</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/polymorphic-malware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/polymorphic-malware/</guid><description>Polymorphic Malware Polymorphic Malware - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Port Blocking</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/port-blocking/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/port-blocking/</guid><description>Port Blocking Port Blocking - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DMZ Firewalls Overview Honeypots Jump Server Microsegmentation Network Segmentation Zero Trust Architecture</description></item><item><title>Port Scanning</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/port-scanning/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/port-scanning/</guid><description>Port Scanning Port Scanning - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Lookup Host Check ICMP Echo Network Attacks Network Evasion Techniques Network Protocols TCP Port Scan VPNs Wireless and Physical Attacks</description></item><item><title>Port Scanning Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/nmap/port-scanning-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/nmap/port-scanning-techniques/</guid><description>Port Scanning Techniques Port Scanning Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Nmap Fundamentals Nmap NSE Scripts Service Detection</description></item><item><title>Portable PE Headers Retrieval</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/portable-pe-headers-retrieval/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/portable-pe-headers-retrieval/</guid><description>Portable PE Headers Retrieval Portable PE Headers Retrieval - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Power and Clock Domain Architecture</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/power-and-clock-domain-architecture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/power-and-clock-domain-architecture/</guid><description>Power and Clock Domain Architecture Power and Clock Domain Architecture - the organization of clock trees and power domains within a SoC, including clock gating, domain isolation, and power management controller design.
Related Links: Arm M-profile Bus Fabrics and On-Chip Interconnects CPU Core Concepts Heterogeneous SoCs and Co-processors Memory Architecture RISC-V Single Core vs Multi-Core Architectures</description></item><item><title>Power Line Communication Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/power-line-communication-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/power-line-communication-exploits/</guid><description>Power Line Communication Exploits Power Line Communication Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Acoustic Communication Exploits Bluetooth Exploits Deauth Evil Twin Attacks Infrared Exploits Near-Field Communication (NFC) Exploits Quantum Communication Exploits Radio Frequency Exploits Rogue Access Point Satellite Communication Exploits Ultrasonic Communication Exploits Visible Light Communication Exploits WiFi Exploits</description></item><item><title>Power Regulation and Conversion</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/power-regulation-and-conversion/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/power-regulation-and-conversion/</guid><description>Power Regulation and Conversion Power Regulation and Conversion - circuits that convert and regulate supply voltages for embedded hardware, including LDOs, buck converters, and boost converters.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Power Sources and Power Budgeting</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/power-sources-and-power-budgeting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/power-sources-and-power-budgeting/</guid><description>Power Sources and Power Budgeting Power Sources and Power Budgeting - battery types, energy harvesting sources, and methods for estimating and managing total system power consumption.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Power-Aware Execution Strategies</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/power-aware-execution-strategies/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/power-aware-execution-strategies/</guid><description>Power-Aware Execution Strategies Power-Aware Execution Strategies - techniques for reducing energy consumption through sleep modes, clock gating, and workload scheduling.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>PowerShell</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/powershell/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/powershell/</guid><description>PowerShell PowerShell - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>PowerShell Execution via .NET Hosting API</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/powershell-execution-via-.net-hosting-api/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/powershell-execution-via-.net-hosting-api/</guid><description>PowerShell Execution via .NET Hosting API PowerShell Execution via .NET Hosting API - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes Proxy Execute NtAllocateVirtualMemory with Timer APIs Proxy Execute NtAllocateVirtualMemory with Work Item APIs Proxy Execute NtCreateThreadEx with Work Item APIs Reverse Shell Reverse Shells Overview Running JScript Code in Memory Send Keystrokes to Remote Server Shell Execution SignalObjectAndWait Alertable Function SleepEx Alertable Function Upload File via SMB User Shared Data Delay WaitForMultipleObjectsEx Alertable Function WaitForSingleObjectEx Alertable Function WMI Query</description></item><item><title>PowerShell Security</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/powershell-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/powershell-security/</guid><description>PowerShell Security PowerShell Security - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>PPID Spoofing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/ppid-spoofing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/ppid-spoofing/</guid><description>PPID Spoofing PPID Spoofing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Practical Phishing Detection Examples</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/practical-phishing-detection-examples/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/phishing-anti-analysis/practical-phishing-detection-examples/</guid><description>Practical Phishing Detection Examples Practical Phishing Detection Examples - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing Server Security Anti-Analysis Approve Access via Discord Anti-Analysis Approve Access via Email Anti-Analysis Approve Access via Push Notifications Anti-Analysis Dynamic Obfuscation via Obfuscatorio Anti-Analysis via AES Encryption Anti-Analysis via Base64 Obfuscation Anti-Analysis via Cookie Check Anti-Analysis via Dynamic Encryption Anti-Analysis via Dynamic HTML Generation Anti-Analysis via Fetching Remote Content Anti-Analysis via Honeypots Anti-Analysis via Invisible Encoding Anti-Analysis via IP Restrictions Anti-Analysis via Reverse DNS Query Anti-Analysis via Website Keying Anti-Analysis via XOR Obfuscation Cloning Detection Mechanisms Evading Google Safe Browsing Hiding Domain via Referrer Policy Phishing Detection Methods</description></item><item><title>Preemptive RTOS Scheduling</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/preemptive-rtos-scheduling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/preemptive-rtos-scheduling/</guid><description>Preemptive RTOS Scheduling Preemptive RTOS Scheduling - real-time operating system model where the scheduler can interrupt a running task to give the CPU to a higher-priority task.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>Pretexting</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/physical-social-engineering/pretexting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/physical-social-engineering/pretexting/</guid><description>Pretexting Pretexting - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Dumpster Diving Impersonation Techniques Lock Picking</description></item><item><title>Print a Hexadecimal Array</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/print-a-hexadecimal-array/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/print-a-hexadecimal-array/</guid><description>Print a Hexadecimal Array Print a Hexadecimal Array - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Print OS Version</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/print-os-version/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/print-os-version/</guid><description>Print OS Version Print OS Version - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Print OS Version</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/print-os-version/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/print-os-version/</guid><description>Print OS Version Print OS Version - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Privacy</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/</guid><description>Privacy Privacy - technologies, tools, and techniques for protecting personal data and maintaining anonymity in digital environments.
Operating Systems for Privacy Privacy Techniques Privacy-Focused Cloud Storage Providers Privacy-Focused Email Providers Privacy-Focused Hardware Devices Privacy-Focused Messaging Apps Privacy-Focused Operating Systems Privacy-Focused Search Engines Privacy-Focused Social Media Platforms Privacy-Focused Software Applications Privacy-Focused VPN Providers Privacy-Focused Web Browsers Related Links: CIA Triad Information Security Models Overview</description></item><item><title>Privacy Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-techniques/</guid><description>Privacy Techniques Privacy Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Operating Systems for Privacy Privacy-Focused Cloud Storage Providers Privacy-Focused Email Providers Privacy-Focused Hardware Devices Privacy-Focused Messaging Apps Privacy-Focused Operating Systems Privacy-Focused Search Engines Privacy-Focused Social Media Platforms Privacy-Focused Software Applications Privacy-Focused VPN Providers Privacy-Focused Web Browsers</description></item><item><title>Privacy-Focused Cloud Storage Providers</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-cloud-storage-providers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-cloud-storage-providers/</guid><description>Privacy-Focused Cloud Storage Providers Privacy-Focused Cloud Storage Providers - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Operating Systems for Privacy Privacy Techniques Privacy-Focused Email Providers Privacy-Focused Hardware Devices Privacy-Focused Messaging Apps Privacy-Focused Operating Systems Privacy-Focused Search Engines Privacy-Focused Social Media Platforms Privacy-Focused Software Applications Privacy-Focused VPN Providers Privacy-Focused Web Browsers</description></item><item><title>Privacy-Focused Email Providers</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-email-providers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-email-providers/</guid><description>Privacy-Focused Email Providers Privacy-Focused Email Providers - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Operating Systems for Privacy Privacy Techniques Privacy-Focused Cloud Storage Providers Privacy-Focused Hardware Devices Privacy-Focused Messaging Apps Privacy-Focused Operating Systems Privacy-Focused Search Engines Privacy-Focused Social Media Platforms Privacy-Focused Software Applications Privacy-Focused VPN Providers Privacy-Focused Web Browsers</description></item><item><title>Privacy-Focused Hardware Devices</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-hardware-devices/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-hardware-devices/</guid><description>Privacy-Focused Hardware Devices Privacy-Focused Hardware Devices - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Operating Systems for Privacy Privacy Techniques Privacy-Focused Cloud Storage Providers Privacy-Focused Email Providers Privacy-Focused Messaging Apps Privacy-Focused Operating Systems Privacy-Focused Search Engines Privacy-Focused Social Media Platforms Privacy-Focused Software Applications Privacy-Focused VPN Providers Privacy-Focused Web Browsers</description></item><item><title>Privacy-Focused Messaging Apps</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-messaging-apps/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-messaging-apps/</guid><description>Privacy-Focused Messaging Apps Privacy-Focused Messaging Apps - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Operating Systems for Privacy Privacy Techniques Privacy-Focused Cloud Storage Providers Privacy-Focused Email Providers Privacy-Focused Hardware Devices Privacy-Focused Operating Systems Privacy-Focused Search Engines Privacy-Focused Social Media Platforms Privacy-Focused Software Applications Privacy-Focused VPN Providers Privacy-Focused Web Browsers</description></item><item><title>Privacy-Focused Operating Systems</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-operating-systems/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-operating-systems/</guid><description>Privacy-Focused Operating Systems Privacy-Focused Operating Systems - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Operating Systems for Privacy Privacy Techniques Privacy-Focused Cloud Storage Providers Privacy-Focused Email Providers Privacy-Focused Hardware Devices Privacy-Focused Messaging Apps Privacy-Focused Search Engines Privacy-Focused Social Media Platforms Privacy-Focused Software Applications Privacy-Focused VPN Providers Privacy-Focused Web Browsers</description></item><item><title>Privacy-Focused Search Engines</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-search-engines/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-search-engines/</guid><description>Privacy-Focused Search Engines Privacy-Focused Search Engines - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Operating Systems for Privacy Privacy Techniques Privacy-Focused Cloud Storage Providers Privacy-Focused Email Providers Privacy-Focused Hardware Devices Privacy-Focused Messaging Apps Privacy-Focused Operating Systems Privacy-Focused Social Media Platforms Privacy-Focused Software Applications Privacy-Focused VPN Providers Privacy-Focused Web Browsers</description></item><item><title>Privacy-Focused Social Media Platforms</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-social-media-platforms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-social-media-platforms/</guid><description>Privacy-Focused Social Media Platforms Privacy-Focused Social Media Platforms - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Operating Systems for Privacy Privacy Techniques Privacy-Focused Cloud Storage Providers Privacy-Focused Email Providers Privacy-Focused Hardware Devices Privacy-Focused Messaging Apps Privacy-Focused Operating Systems Privacy-Focused Search Engines Privacy-Focused Software Applications Privacy-Focused VPN Providers Privacy-Focused Web Browsers</description></item><item><title>Privacy-Focused Software Applications</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-software-applications/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-software-applications/</guid><description>Privacy-Focused Software Applications Privacy-Focused Software Applications - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Operating Systems for Privacy Privacy Techniques Privacy-Focused Cloud Storage Providers Privacy-Focused Email Providers Privacy-Focused Hardware Devices Privacy-Focused Messaging Apps Privacy-Focused Operating Systems Privacy-Focused Search Engines Privacy-Focused Social Media Platforms Privacy-Focused VPN Providers Privacy-Focused Web Browsers</description></item><item><title>Privacy-Focused VPN Providers</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-vpn-providers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-vpn-providers/</guid><description>Privacy-Focused VPN Providers Privacy-Focused VPN Providers - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Operating Systems for Privacy Privacy Techniques Privacy-Focused Cloud Storage Providers Privacy-Focused Email Providers Privacy-Focused Hardware Devices Privacy-Focused Messaging Apps Privacy-Focused Operating Systems Privacy-Focused Search Engines Privacy-Focused Social Media Platforms Privacy-Focused Software Applications Privacy-Focused Web Browsers</description></item><item><title>Privacy-Focused Web Browsers</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-web-browsers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/information-security-models/privacy/privacy-focused-web-browsers/</guid><description>Privacy-Focused Web Browsers Privacy-Focused Web Browsers - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Operating Systems for Privacy Privacy Techniques Privacy-Focused Cloud Storage Providers Privacy-Focused Email Providers Privacy-Focused Hardware Devices Privacy-Focused Messaging Apps Privacy-Focused Operating Systems Privacy-Focused Search Engines Privacy-Focused Social Media Platforms Privacy-Focused Software Applications Privacy-Focused VPN Providers</description></item><item><title>Privilege Escalation Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/privilege-escalation-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/privilege-escalation-techniques/</guid><description>Privilege Escalation Techniques Privilege Escalation Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Python Jail Breaking Registry Kill Switch</description></item><item><title>Privilege Levels</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/cpu-core-concepts/privilege-levels/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/cpu-core-concepts/privilege-levels/</guid><description>Privilege Levels Privilege Levels - the hardware-enforced execution modes (such as privileged and unprivileged) that control access to protected instructions, registers, and memory regions.
Related Links: ISA</description></item><item><title>Privilege Model and Trap Handling</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/privilege-model-and-trap-handling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/privilege-model-and-trap-handling/</guid><description>Privilege Model and Trap Handling Privilege Model and Trap Handling - the RISC-V privilege levels (Machine, Supervisor, User) and the trap mechanism used to handle exceptions, interrupts, and environment calls across privilege boundaries.
Related Links: Platform Interrupt Architecture PMP and Isolation</description></item><item><title>Privilege Query</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/privilege-query/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/privilege-query/</guid><description>Privilege Query Privilege Query - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Privileged Access Management</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/privileged-access-management/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/privileged-access-management/</guid><description>Privileged Access Management Privileged Access Management - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Active Directory Fundamentals Group Administration IAM Policies Identity and Access Management Fundamentals Identity Federation Pass the Hash User Administration</description></item><item><title>Process Creation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/process-creation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/process-creation/</guid><description>Process Creation Process Creation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Process Enumeration</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/process-enumeration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/process-enumeration/</guid><description>Process Enumeration Process Enumeration - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Process Enumeration via ZwQuerySystemInformation Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/process-enumeration-via-zwquerysysteminformation-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/process-enumeration-via-zwquerysysteminformation-kernel/</guid><description>Process Enumeration via ZwQuerySystemInformation Kernel Process Enumeration via ZwQuerySystemInformation Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Process Hollowing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/process-hollowing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/process-hollowing/</guid><description>Process Hollowing Process Hollowing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Process Hypnosis</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/process-hypnosis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/process-hypnosis/</guid><description>Process Hypnosis Process Hypnosis - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Process Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/</guid><description>Process Injection Process Injection - techniques for executing arbitrary code inside the address space of a legitimate process to evade detection and gain privileges.
API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution Related Links: Beacon Object Files (BOF) C2 and Networking Credential Dumping Malware Concepts Payload and PE Persistence Sleep Obfuscation Windows Internals</description></item><item><title>Profiling performance</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/profiling-performance/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/profiling-performance/</guid><description>Profiling performance Profiling Performance - technique of measuring runtime behavior to identify performance bottlenecks in applications.
Related Links: Building for scale Caching Caching Fundamentals Docker Instrumentation and monitoring Kubernetes System Design Fundamentals Telemetry</description></item><item><title>Protecting Evilginx Server via Caddy</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/protecting-evilginx-server-via-caddy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/protecting-evilginx-server-via-caddy/</guid><description>Protecting Evilginx Server via Caddy Protecting Evilginx Server via Caddy - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx Phishlet Development Evilginx URL Rewriting GitHub Device Code Phishing GitLab Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Microsoft Device Code Phishing</description></item><item><title>Protecting Phishing Servers via Caddy</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/protecting-phishing-servers-via-caddy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/protecting-phishing-servers-via-caddy/</guid><description>Protecting Phishing Servers via Caddy Protecting Phishing Servers via Caddy - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Protecting Phishing Servers via Mod Rewrite</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/protecting-phishing-servers-via-mod-rewrite/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/protecting-phishing-servers-via-mod-rewrite/</guid><description>Protecting Phishing Servers via Mod Rewrite Protecting Phishing Servers via Mod Rewrite - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Protecting Phishing Servers via Nginx</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/nginx/protecting-phishing-servers-via-nginx/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/nginx/protecting-phishing-servers-via-nginx/</guid><description>Protecting Phishing Servers via Nginx Protecting Phishing Servers via Nginx - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Introduction to Nginx Capabilities Nginx Demo Reverse Proxying Nginx Fundamentals</description></item><item><title>Protocol Analysis</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/wireshark/protocol-analysis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/wireshark/protocol-analysis/</guid><description>Protocol Analysis Protocol Analysis - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Network Forensics with Wireshark Tcpdump Wireshark Fundamentals</description></item><item><title>Proxy Execute NtAllocateVirtualMemory with Timer APIs</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/proxy-execute-ntallocatevirtualmemory-with-timer-apis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/proxy-execute-ntallocatevirtualmemory-with-timer-apis/</guid><description>Proxy Execute NtAllocateVirtualMemory with Timer APIs Proxy Execute NtAllocateVirtualMemory with Timer APIs - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Proxy Execute NtAllocateVirtualMemory with Timer APIs C</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/proxy-execute-ntallocatevirtualmemory-with-timer-apis-c/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/proxy-execute-ntallocatevirtualmemory-with-timer-apis-c/</guid><description>Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Timer APIs C - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Proxy Execute NtAllocateVirtualMemory with Work Item APIs</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/proxy-execute-ntallocatevirtualmemory-with-work-item-apis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/proxy-execute-ntallocatevirtualmemory-with-work-item-apis/</guid><description>Proxy Execute NtAllocateVirtualMemory with Work Item APIs Proxy Execute NtAllocateVirtualMemory with Work Item APIs - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Proxy Execute NtAllocateVirtualMemory with Work Item APIs C</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/proxy-execute-ntallocatevirtualmemory-with-work-item-apis-c/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/proxy-execute-ntallocatevirtualmemory-with-work-item-apis-c/</guid><description>Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Proxy Execute NtCreateThreadEx with Work Item APIs</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/proxy-execute-ntcreatethreadex-with-work-item-apis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/proxy-execute-ntcreatethreadex-with-work-item-apis/</guid><description>Proxy Execute NtCreateThreadEx with Work Item APIs Proxy Execute NtCreateThreadEx with Work Item APIs - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Proxy Execute NtCreateThreadEx with Work Item APIs C</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/proxy-execute-ntcreatethreadex-with-work-item-apis-c/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/proxy-execute-ntcreatethreadex-with-work-item-apis-c/</guid><description>Proxy Execute NtCreateThreadEx with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Python</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/</guid><description>Python Python - Python language features, tooling, testing, and AI capabilities relevant to backend development.
AI and LLMs Language Fundamentals Software Engineering Related Links: Backend Engineering Concurrency Databases Django DSA Security System Design Web</description></item><item><title>Python for Malware Development</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/python-for-malware-development/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/python-for-malware-development/</guid><description>Python for Malware Development Python for Malware Development - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Python Jail Breaking</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/python-jail-breaking/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/python-jail-breaking/</guid><description>Python Jail Breaking Python Jail Breaking - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Registry Kill Switch</description></item><item><title>Quantum Communication Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/quantum-communication-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/quantum-communication-exploits/</guid><description>Quantum Communication Exploits Quantum Communication Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Acoustic Communication Exploits Bluetooth Exploits Deauth Evil Twin Attacks Infrared Exploits Near-Field Communication (NFC) Exploits Power Line Communication Exploits Radio Frequency Exploits Rogue Access Point Satellite Communication Exploits Ultrasonic Communication Exploits Visible Light Communication Exploits WiFi Exploits</description></item><item><title>Query Active Directory Site Name MS-NRPC</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-active-directory-site-name-ms-nrpc/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-active-directory-site-name-ms-nrpc/</guid><description>Query Active Directory Site Name MS-NRPC Query Active Directory Site Name MS-NRPC - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query CFG Status</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-cfg-status/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-cfg-status/</guid><description>Query CFG Status Query CFG Status - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query DNS Domain Information MS-LSAD</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-dns-domain-information-ms-lsad/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-dns-domain-information-ms-lsad/</guid><description>Query DNS Domain Information MS-LSAD Query DNS Domain Information MS-LSAD - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query Domain Controller Information MS-NRPC</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-domain-controller-information-ms-nrpc/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-domain-controller-information-ms-nrpc/</guid><description>Query Domain Controller Information MS-NRPC Query Domain Controller Information MS-NRPC - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query DSSP Operation State MS-DSSP</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-dssp-operation-state-ms-dssp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-dssp-operation-state-ms-dssp/</guid><description>Query DSSP Operation State MS-DSSP Query DSSP Operation State MS-DSSP - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query DSSP Primary Domain Info MS-DSSP</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-dssp-primary-domain-info-ms-dssp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-dssp-primary-domain-info-ms-dssp/</guid><description>Query DSSP Primary Domain Info MS-DSSP Query DSSP Primary Domain Info MS-DSSP - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query DSSP Upgrade Status MS-DSSP</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-dssp-upgrade-status-ms-dssp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-dssp-upgrade-status-ms-dssp/</guid><description>Query DSSP Upgrade Status MS-DSSP Query DSSP Upgrade Status MS-DSSP - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query Extended Service Status</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/query-extended-service-status/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/query-extended-service-status/</guid><description>Query Extended Service Status Query Extended Service Status - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Query Extended Service Status MS-SCMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-extended-service-status-ms-scmr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-extended-service-status-ms-scmr/</guid><description>Query Extended Service Status MS-SCMR Query Extended Service Status MS-SCMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query Remote Registry Key</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/query-remote-registry-key/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/query-remote-registry-key/</guid><description>Query Remote Registry Key Query Remote Registry Key - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Query Remote Service</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/query-remote-service/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/query-remote-service/</guid><description>Query Remote Service Query Remote Service - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Query RPC Runtime Statistics C706-MGMT</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-rpc-runtime-statistics-c706-mgmt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-rpc-runtime-statistics-c706-mgmt/</guid><description>Query RPC Runtime Statistics C706-MGMT Query RPC Runtime Statistics C706-MGMT - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query Service Configuration MS-SCMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/query-service-configuration-ms-scmr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/query-service-configuration-ms-scmr/</guid><description>Query Service Configuration MS-SCMR Query Service Configuration MS-SCMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Query SMB Share Permissions</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-smb-share-permissions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-smb-share-permissions/</guid><description>Query SMB Share Permissions Query SMB Share Permissions - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query User Account Control MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-user-account-control-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-user-account-control-ms-samr/</guid><description>Query User Account Control MS-SAMR Query User Account Control MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query User General Info MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-user-general-info-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-user-general-info-ms-samr/</guid><description>Query User General Info MS-SAMR Query User General Info MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query User Home Info MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-user-home-info-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-user-home-info-ms-samr/</guid><description>Query User Home Info MS-SAMR Query User Home Info MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query User Logon Info MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-user-logon-info-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-user-logon-info-ms-samr/</guid><description>Query User Logon Info MS-SAMR Query User Logon Info MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query User Parameters MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-user-parameters-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-user-parameters-ms-samr/</guid><description>Query User Parameters MS-SAMR Query User Parameters MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query User Preferences MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-user-preferences-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-user-preferences-ms-samr/</guid><description>Query User Preferences MS-SAMR Query User Preferences MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Query Username Info MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-username-info-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/query-username-info-ms-samr/</guid><description>Query Username Info MS-SAMR Query Username Info MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>QuerySets and Managers</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/querysets-and-managers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/querysets-and-managers/</guid><description>QuerySets and Managers QuerySets and Managers - lazy, chainable query API and custom manager methods for complex database interactions.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>Queues</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/queues/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/queues/</guid><description>Queues Queues - FIFO data structure supporting enqueue and dequeue in O(1), implemented with collections.deque.
Related Links: Arrays Binary Search Trees Graphs Hash Tables Heaps Linked Lists Sets Stacks Strings Trees Tries</description></item><item><title>Radio Frequency Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/radio-frequency-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/radio-frequency-exploits/</guid><description>Radio Frequency Exploits Radio Frequency Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Acoustic Communication Exploits Bluetooth Exploits Deauth Evil Twin Attacks Infrared Exploits Near-Field Communication (NFC) Exploits Power Line Communication Exploits Quantum Communication Exploits Rogue Access Point Satellite Communication Exploits Ultrasonic Communication Exploits Visible Light Communication Exploits WiFi Exploits</description></item><item><title>RAGs</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/ai-and-llms/rags/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/ai-and-llms/rags/</guid><description>RAGs RAGs - Retrieval-Augmented Generation combining knowledge retrieval with language model generation.
Related Links: Ai in development Embeddings Function calling Structured outputs</description></item><item><title>Random Key Generation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/random-key-generation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/random-key-generation/</guid><description>Random Key Generation Random Key Generation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Base N Encoder Entropy Reduction Brute Forcing Key Decryption Caesar Cipher Encryption Decryption ChaCha20 Encryption Algorithm Data Encryption Techniques Encryption Fundamentals Generating Encryption Keys Without WinAPI Calls RC4 SystemFunction040 Encryption Decryption XOR Encryption Decryption via Multi-Byte Key XOR Encryption Decryption via Single Byte</description></item><item><title>Ransomware</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/ransomware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/ransomware/</guid><description>Ransomware Ransomware - malware that encrypts victim data and demands payment for decryption keys, studied here from a development and defensive perspective.
Automated Ransomware Development Deleting Shadow Copies and System Restore Points File Encryption File Enumeration Legal and Ethical Considerations Ransomware Emulation Ransomware Overview Windows Internals for Ransomware Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Rate limiting</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/rate-limiting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/rate-limiting/</guid><description>Rate limiting Rate Limiting - controlling the rate of incoming requests to protect services from overload.
Related Links: Backpressure Circuit breakers Event-driven architecture Failure modes Graceful degradation Loadshifting Real time data Realtime Server sent events short polling Streaming Throttling Websockets</description></item><item><title>RC4</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/rc4/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/rc4/</guid><description>RC4 RC4 - a stream cipher algorithm and its various implementation approaches for use in offensive security tools.
RC4 Decryption Encryption via Custom RC4 Algorithm RC4 Decryption Encryption via NTAPI RC4 Encryption Decryption Related Links: AES Base N Encoder Entropy Reduction Brute Forcing Key Decryption Caesar Cipher Encryption Decryption ChaCha20 Encryption Algorithm Data Encryption Techniques Encryption Fundamentals Generating Encryption Keys Without WinAPI Calls Random Key Generation SystemFunction040 Encryption Decryption XOR Encryption Decryption via Multi-Byte Key XOR Encryption Decryption via Single Byte</description></item><item><title>RC4 Decryption Encryption via Custom RC4 Algorithm</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/rc4/rc4-decryption-encryption-via-custom-rc4-algorithm/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/rc4/rc4-decryption-encryption-via-custom-rc4-algorithm/</guid><description>RC4 Decryption Encryption via Custom RC4 Algorithm RC4 Decryption Encryption via Custom RC4 Algorithm - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: RC4 Decryption Encryption via NTAPI RC4 Encryption Decryption</description></item><item><title>RC4 Decryption Encryption via NTAPI</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/rc4/rc4-decryption-encryption-via-ntapi/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/rc4/rc4-decryption-encryption-via-ntapi/</guid><description>RC4 Decryption Encryption via NTAPI RC4 Decryption Encryption via NTAPI - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: RC4 Decryption Encryption via Custom RC4 Algorithm RC4 Encryption Decryption</description></item><item><title>RC4 Encryption Decryption</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/rc4/rc4-encryption-decryption/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/rc4/rc4-encryption-decryption/</guid><description>RC4 Encryption Decryption RC4 Encryption Decryption - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: RC4 Decryption Encryption via Custom RC4 Algorithm RC4 Decryption Encryption via NTAPI</description></item><item><title>Read Clipboard Data</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/read-clipboard-data/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/read-clipboard-data/</guid><description>Read Clipboard Data Read Clipboard Data - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Read Process Memory via Pread</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/read-process-memory-via-pread/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/read-process-memory-via-pread/</guid><description>Read Process Memory via Pread Read Process Memory via Pread - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Reading a File Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/reading-a-file-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/reading-a-file-kernel/</guid><description>Reading a File Kernel Reading a File Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Real time data</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/real-time-data/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/real-time-data/</guid><description>Real time data Real-Time Data - data processed and delivered with minimal latency for immediate consumption.
Related Links: Backpressure Circuit breakers Event-driven architecture Failure modes Graceful degradation Loadshifting Rate limiting Realtime Server sent events short polling Streaming Throttling Websockets</description></item><item><title>Real-Time Constraints, Latency, and Jitter</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/real-time-constraints-latency-and-jitter/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/real-time-constraints-latency-and-jitter/</guid><description>Real-Time Constraints, Latency, and Jitter Real-Time Constraints, Latency, and Jitter - timing requirements for embedded systems including deadlines, worst-case execution times, and sources of scheduling variance.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>Realtime</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/realtime/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/realtime/</guid><description>Realtime Realtime - patterns and technologies for delivering data and events with sub-second latency.
Related Links: Backpressure Circuit breakers Event-driven architecture Failure modes Graceful degradation Loadshifting Rate limiting Real time data Server sent events short polling Streaming Throttling Websockets</description></item><item><title>Reconnaissance Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/threat-modeling/reconnaissance-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/threat-modeling/reconnaissance-techniques/</guid><description>Reconnaissance Techniques Reconnaissance Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APT OSINT Supply Chain Attacks Threat Modeling Fundamentals Zero Day</description></item><item><title>Recursion</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/recursion/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/recursion/</guid><description>Recursion Recursion - technique where a function calls itself to reduce a problem into smaller subproblems until a base case is reached.
Related Links: Backtracking Big O Notation Bit Manipulation Divide and Conquer Dynamic Programming Graph Algorithms Greedy Algorithms Searching Sorting</description></item><item><title>Recursive queries</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/recursive-queries/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/recursive-queries/</guid><description>Recursive queries Recursive Queries - SQL queries using CTEs to traverse hierarchical or tree-structured data.
Related Links: Advanced SQL Aggregate queries Common table expressions (CTEs) Dynamic SQL Join queries Pivot and unpivot operations Select, insert, delete, update statements Stored procedures and triggers Subqueries Views Window functions</description></item><item><title>Redis</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/redis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/redis/</guid><description>Redis Redis - in-memory data structure store used as a cache, database, and message broker.
Related Links: Column dbs Document dbs Elasticsearch Graphdbs Key value Memcached Non-relational databases NoSQL databases Relational databases Search engines Solr Time series dbs Vector databases</description></item><item><title>Refactoring</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/refactoring/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/refactoring/</guid><description>Refactoring Refactoring - process of restructuring existing code to improve readability without changing behavior.
Related Links: Code reviews Documentation generation Functional testing Git Integration testing Unit testing</description></item><item><title>Reflective DLL Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/reflective-dll-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/reflective-dll-injection/</guid><description>Reflective DLL Injection Reflective DLL Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Register Definitions with C Structures</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/register-definitions-with-c-structures/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/register-definitions-with-c-structures/</guid><description>Register Definitions with C Structures Register Definitions with C Structures - use of structs and bitfields to model memory-mapped peripheral register blocks with named field access.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Registry Interaction</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/registry-interaction/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/registry-interaction/</guid><description>Registry Interaction Registry Interaction - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Registry Key Interaction</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/registry-key-interaction/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/registry-key-interaction/</guid><description>Registry Key Interaction Registry Key Interaction - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Registry Kill Switch</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/registry-kill-switch/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/registry-kill-switch/</guid><description>Registry Kill Switch Registry Kill Switch - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking</description></item><item><title>Registry Modifications</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/registry-modifications/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/registry-modifications/</guid><description>Registry Modifications Registry Modifications - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Reimplementing Injection via Syscalls</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/reimplementing-injection-via-syscalls/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/reimplementing-injection-via-syscalls/</guid><description>Reimplementing Injection via Syscalls Reimplementing Injection via Syscalls - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Relational databases</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/relational-databases/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/relational-databases/</guid><description>Relational databases Relational Databases - databases organizing data into structured tables with defined relationships between them.
Related Links: Column dbs Document dbs Elasticsearch Graphdbs Key value Memcached Non-relational databases NoSQL databases Redis Search engines Solr Time series dbs Vector databases</description></item><item><title>Release Strategies</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/pipeline-and-delivery/release-strategies/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/pipeline-and-delivery/release-strategies/</guid><description>Release Strategies Release Strategies - blue/green, canary, rolling, and feature-flag deployment techniques for controlled releases.
Related Links: CI-CD Fundamentals Deployment Development Phase Requirements and Design Phase Testing</description></item><item><title>Relocation, Linking, Literal Pools, and Veneers</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/relocation-linking-literal-pools-and-veneers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/relocation-linking-literal-pools-and-veneers/</guid><description>Relocation, Linking, Literal Pools, and Veneers Relocation, Linking, Literal Pools, and Veneers - how the linker resolves symbol references, manages literal pools, and inserts veneers for out-of-range branches.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Remote APC Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/remote-apc-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/remote-apc-injection/</guid><description>Remote APC Injection Remote APC Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Remote DLL Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/remote-dll-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/remote-dll-injection/</guid><description>Remote DLL Injection Remote DLL Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Remote Function Stomping</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/remote-function-stomping/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/remote-function-stomping/</guid><description>Remote Function Stomping Remote Function Stomping - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Remote Mapping Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/remote-mapping-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/remote-mapping-injection/</guid><description>Remote Mapping Injection Remote Mapping Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Remote Module Stomping</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/remote-module-stomping/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/remote-module-stomping/</guid><description>Remote Module Stomping Remote Module Stomping - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Remote Payload Execution</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/remote-payload-execution/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/remote-payload-execution/</guid><description>Remote Payload Execution Remote Payload Execution - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Remote Payload Execution via Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/remote-payload-execution-via-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/remote-payload-execution-via-injection/</guid><description>Remote Payload Execution via Injection Remote Payload Execution via Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Repeater</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/burp-suite/repeater/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/burp-suite/repeater/</guid><description>Repeater Repeater - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Burp Suite Fundamentals Intercepting Proxy Intruder Scanner</description></item><item><title>Requirements and Design Phase</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/pipeline-and-delivery/requirements-and-design-phase/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/pipeline-and-delivery/requirements-and-design-phase/</guid><description>Requirements and Design Phase Requirements and Design Phase - incorporating security and operational requirements into software architecture from the outset.
Related Links: CI-CD Fundamentals Deployment Development Phase Release Strategies Testing</description></item><item><title>Resolve Names to RIDs MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/resolve-names-to-rids-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/resolve-names-to-rids-ms-samr/</guid><description>Resolve Names to RIDs MS-SAMR Resolve Names to RIDs MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Resolve RIDs to Names MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/resolve-rids-to-names-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/resolve-rids-to-names-ms-samr/</guid><description>Resolve RIDs to Names MS-SAMR Resolve RIDs to Names MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>REST</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/rest/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/rest/</guid><description>REST REST - architectural style for distributed systems based on stateless client-server communication over HTTP.
Related Links: API API Design API styles GraphQL GraphQL Fundamentals GRPC HTTP and API Fundamentals Open API Specification (OAS) REST API Design SOAP</description></item><item><title>REST API Design</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/rest-api-design/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/rest-api-design/</guid><description>REST API Design REST API Design - best practices for designing RESTful APIs including resource naming and HTTP method usage.
Related Links: API API Design API styles GraphQL GraphQL Fundamentals GRPC HTTP and API Fundamentals Open API Specification (OAS) REST SOAP</description></item><item><title>Retrieve Domain Computers</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-domain-computers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-domain-computers/</guid><description>Retrieve Domain Computers Retrieve Domain Computers - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Retrieve Domain Groups</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-domain-groups/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-domain-groups/</guid><description>Retrieve Domain Groups Retrieve Domain Groups - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Retrieve Domain User Descriptions</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-domain-user-descriptions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-domain-user-descriptions/</guid><description>Retrieve Domain User Descriptions Retrieve Domain User Descriptions - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Retrieve Domain Users with All Attributes</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-domain-users-with-all-attributes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-domain-users-with-all-attributes/</guid><description>Retrieve Domain Users with All Attributes Retrieve Domain Users with All Attributes - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Retrieve MAC Address via NetBIOS</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-mac-address-via-netbios/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-mac-address-via-netbios/</guid><description>Retrieve MAC Address via NetBIOS Retrieve MAC Address via NetBIOS - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Retrieve MS-DS-MachineAccountQuota</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-ms-ds-machineaccountquota/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-ms-ds-machineaccountquota/</guid><description>Retrieve MS-DS-MachineAccountQuota Retrieve MS-DS-MachineAccountQuota - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Retrieve Private Data MS-LSAD</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-private-data-ms-lsad/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-private-data-ms-lsad/</guid><description>Retrieve Private Data MS-LSAD Retrieve Private Data MS-LSAD - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve TXT Records RID to SID MS-SAMR Share Enumeration</description></item><item><title>Retrieve TXT Records</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-txt-records/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/retrieve-txt-records/</guid><description>Retrieve TXT Records Retrieve TXT Records - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD RID to SID MS-SAMR Share Enumeration</description></item><item><title>Retrieving Kernel Version</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/retrieving-kernel-version/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/retrieving-kernel-version/</guid><description>Retrieving Kernel Version Retrieving Kernel Version - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Retrieving Process Identifier Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/retrieving-process-identifier-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/retrieving-process-identifier-kernel/</guid><description>Retrieving Process Identifier Kernel Retrieving Process Identifier Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Retrieving Process Image Base Address Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/retrieving-process-image-base-address-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/retrieving-process-image-base-address-kernel/</guid><description>Retrieving Process Image Base Address Kernel Retrieving Process Image Base Address Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Retrieving Process Name Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/retrieving-process-name-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/retrieving-process-name-kernel/</guid><description>Retrieving Process Name Kernel Retrieving Process Name Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Retrieving Process Parent ID Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/retrieving-process-parent-id-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/retrieving-process-parent-id-kernel/</guid><description>Retrieving Process Parent ID Kernel Retrieving Process Parent ID Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Retrieving Process Session ID Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/retrieving-process-session-id-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/retrieving-process-session-id-kernel/</guid><description>Retrieving Process Session ID Kernel Retrieving Process Session ID Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Retrieving the Address of an Unexported ZW API Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/retrieving-the-address-of-an-unexported-zw-api-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/retrieving-the-address-of-an-unexported-zw-api-kernel/</guid><description>Retrieving the Address of an Unexported ZW API Kernel Retrieving the Address of an Unexported ZW API Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Reverse Engineering</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/reverse-engineering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/reverse-engineering/</guid><description>Reverse Engineering Reverse Engineering - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analysis Methods Automated Malware Analysis Maltego Memory Leaks Metasploit Urlvoid Virustotal</description></item><item><title>Reverse Engineering with Ghidra</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/ghidra/reverse-engineering-with-ghidra/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/ghidra/reverse-engineering-with-ghidra/</guid><description>Reverse Engineering with Ghidra Reverse Engineering with Ghidra - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ghidra Fundamentals Ghidra Scripting Static Analysis with Ghidra</description></item><item><title>Reverse Shell</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/reverse-shell/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/reverse-shell/</guid><description>Reverse Shell Reverse Shell - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Reverse Shells Overview</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/reverse-shells-overview/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/reverse-shells-overview/</guid><description>Reverse Shells Overview Reverse Shells Overview - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>RID to SID MS-SAMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/rid-to-sid-ms-samr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/rid-to-sid-ms-samr/</guid><description>RID to SID MS-SAMR RID to SID MS-SAMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records Share Enumeration</description></item><item><title>RISC-V</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/</guid><description>RISC-V RISC-V - an open-standard instruction set architecture based on RISC principles, increasingly used in embedded systems for its modularity, extensibility, and royalty-free licensing.
Platform Interrupt Architecture PMP and Isolation Privilege Model and Trap Handling Related Links: Arm M-profile Bus Fabrics and On-Chip Interconnects CPU Core Concepts Heterogeneous SoCs and Co-processors Memory Architecture Power and Clock Domain Architecture Single Core vs Multi-Core Architectures</description></item><item><title>Rogue Access Point</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/rogue-access-point/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/rogue-access-point/</guid><description>Rogue Access Point Rogue Access Point - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Acoustic Communication Exploits Bluetooth Exploits Deauth Evil Twin Attacks Infrared Exploits Near-Field Communication (NFC) Exploits Power Line Communication Exploits Quantum Communication Exploits Radio Frequency Exploits Satellite Communication Exploits Ultrasonic Communication Exploits Visible Light Communication Exploits WiFi Exploits</description></item><item><title>Role-based access control (RBAC)</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/role-based-access-control-rbac/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/role-based-access-control-rbac/</guid><description>Role-based access control (RBAC) Role-Based Access Control - authorization model assigning permissions based on user roles within an organization.
Related Links: Access control lists (ACLs) Attribute-based access control (ABAC) Capability-based access control OAuth OpenID Connect (OIDC)</description></item><item><title>Rootkits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/rootkits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/rootkits/</guid><description>Rootkits Rootkits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Rootkits and Bootkits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/rootkits-and-bootkits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/rootkits-and-bootkits/</guid><description>Rootkits and Bootkits Rootkits and Bootkits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>ROP Hellshall</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/rop-hellshall/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/rop-hellshall/</guid><description>ROP Hellshall ROP Hellshall - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Running JScript Code in Memory</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/running-jscript-code-in-memory/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/running-jscript-code-in-memory/</guid><description>Running JScript Code in Memory Running JScript Code in Memory - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>RunPE</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/runpe/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/runpe/</guid><description>RunPE RunPE - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Runtime Memory Management</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/runtime-view/runtime-memory-management/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/runtime-view/runtime-memory-management/</guid><description>Runtime Memory Management Runtime Memory Management - strategies for allocating, using, and freeing memory during firmware execution, including static allocation and heap management.
Related Links: Task Scheduling and Context Switching</description></item><item><title>Runtime View of Embedded Systems</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/runtime-view/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/runtime-view/</guid><description>Runtime View of Embedded Systems Runtime View of Embedded Systems - the perspective of how an embedded system behaves during execution, including the management of resources, task scheduling, and interaction with the hardware.
Runtime Memory Management Task Scheduling and Context Switching Related Links: C Language for Embedded Systems Embedded Systems Architectures Embedded Systems Communication Protocols Embedded Systems Execution Models Embedded Systems Exploits Embedded Systems Hardware STM32 Microcontrollers</description></item><item><title>Sandbox Evasion Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/sandbox-evasion-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/sandbox-evasion-techniques/</guid><description>Sandbox Evasion Techniques Sandbox Evasion Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview TLS Callbacks for Anti-Debugging User Interaction Evasion Techniques</description></item><item><title>Satellite Communication Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/satellite-communication-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/satellite-communication-exploits/</guid><description>Satellite Communication Exploits Satellite Communication Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Acoustic Communication Exploits Bluetooth Exploits Deauth Evil Twin Attacks Infrared Exploits Near-Field Communication (NFC) Exploits Power Line Communication Exploits Quantum Communication Exploits Radio Frequency Exploits Rogue Access Point Ultrasonic Communication Exploits Visible Light Communication Exploits WiFi Exploits</description></item><item><title>Scalability and Infrastructure</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/</guid><description>Scalability and Infrastructure Scalability and Infrastructure - principles and tools for building systems that grow reliably under increasing load.
Building for scale Caching Caching Fundamentals Docker Instrumentation and monitoring Kubernetes Profiling performance System Design Fundamentals Telemetry Related Links: Architecture Patterns</description></item><item><title>Scanner</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/burp-suite/scanner/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/burp-suite/scanner/</guid><description>Scanner Scanner - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Burp Suite Fundamentals Intercepting Proxy Intruder Repeater</description></item><item><title>Scheduled Tasks and Cron Jobs</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/scheduled-tasks-and-cron-jobs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/scheduled-tasks-and-cron-jobs/</guid><description>Scheduled Tasks and Cron Jobs Scheduled Tasks and Cron Jobs - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Screen Capture to BMP</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/screen-capture-to-bmp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/screen-capture-to-bmp/</guid><description>Screen Capture to BMP Screen Capture to BMP - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Windows DLL Template Worm-Like Propagation XLL Templates</description></item><item><title>Scrypt</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/scrypt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/scrypt/</guid><description>Scrypt Scrypt - password hashing function designed to be memory-intensive to resist hardware-based attacks.
Related Links: Argon2 Bcrypt Hashing algorithms MD5 SHA-1 SHA-256 TLS</description></item><item><title>SDBM String Hashing Algorithm</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/sdbm-string-hashing-algorithm/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/sdbm-string-hashing-algorithm/</guid><description>SDBM String Hashing Algorithm SDBM String Hashing Algorithm - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>SDBM String Hashing Algorithm ASCII</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/sdbm-string-hashing-algorithm-ascii/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/sdbm-string-hashing-algorithm-ascii/</guid><description>SDBM String Hashing Algorithm ASCII SDBM String Hashing Algorithm ASCII - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>SDBM String Hashing Syscalls Hash Values NT</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/sdbm-string-hashing-syscalls-hash-values-nt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/sdbm-string-hashing-syscalls-hash-values-nt/</guid><description>SDBM String Hashing Syscalls Hash Values NT SDBM String Hashing Syscalls Hash Values NT - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>SDBM Syscalls Hash Values ZW</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/sdbm-syscalls-hash-values-zw/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/sdbm-syscalls-hash-values-zw/</guid><description>SDBM Syscalls Hash Values ZW SDBM Syscalls Hash Values ZW - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM WinAPIs Hash Values Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>SDBM WinAPIs Hash Values</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/sdbm-winapis-hash-values/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/sdbm-winapis-hash-values/</guid><description>SDBM WinAPIs Hash Values SDBM WinAPIs Hash Values - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW Self Deletion String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Search engines</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/search-engines/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/search-engines/</guid><description>Search engines Search Engines - systems designed for full-text search and information retrieval from large datasets.
Related Links: Column dbs Document dbs Elasticsearch Graphdbs Key value Memcached Non-relational databases NoSQL databases Redis Relational databases Solr Time series dbs Vector databases</description></item><item><title>Searching</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/searching/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/searching/</guid><description>Searching Searching - finding elements using linear O(n) search and binary O(log n) search on sorted collections.
Related Links: Backtracking Big O Notation Bit Manipulation Divide and Conquer Dynamic Programming Graph Algorithms Greedy Algorithms Recursion Sorting</description></item><item><title>Secure Coding Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/secure-coding-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/secure-coding-fundamentals/</guid><description>Secure Coding Fundamentals Secure Coding Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks</description></item><item><title>Secure Communication Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/secure-communication-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/secure-communication-techniques/</guid><description>Secure Communication Techniques Secure Communication Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Cryptographic Algorithms Cryptography Fundamentals Data Anonymization Techniques Data Masking Techniques Steganography</description></item><item><title>Secure SSH Configuration</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/secure-ssh-configuration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/secure-ssh-configuration/</guid><description>Secure SSH Configuration Secure SSH Configuration - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Securing Server Blocking Direct IP Access</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/securing-server-blocking-direct-ip-access/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/securing-server-blocking-direct-ip-access/</guid><description>Securing Server Blocking Direct IP Access Securing Server Blocking Direct IP Access - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Securing Server Removing Verbose Information</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/securing-server-removing-verbose-information/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/securing-server-removing-verbose-information/</guid><description>Securing Server Removing Verbose Information Securing Server Removing Verbose Information - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Securing Server Restrict HTTP Access</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/securing-server-restrict-http-access/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/securing-server-restrict-http-access/</guid><description>Securing Server Restrict HTTP Access Securing Server Restrict HTTP Access - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Securing Server via Cloudflare</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/securing-server-via-cloudflare/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/securing-server-via-cloudflare/</guid><description>Securing Server via Cloudflare Securing Server via Cloudflare - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Security</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/</guid><description>Security Security - authentication, authorization, cryptography, and security best practices for backend systems.
Authentication Authorization Cryptography Web Security Related Links: Backend Engineering Concurrency Databases Django DSA Python System Design Web</description></item><item><title>Select, insert, delete, update statements</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/select-insert-delete-update-statements/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/select-insert-delete-update-statements/</guid><description>Select, insert, delete, update statements Select, Insert, Delete, Update Statements - core DML statements for reading and modifying database data.
Related Links: Advanced SQL Aggregate queries Common table expressions (CTEs) Dynamic SQL Join queries Pivot and unpivot operations Recursive queries Stored procedures and triggers Subqueries Views Window functions</description></item><item><title>Self Deletion</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/self-deletion/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/self-deletion/</guid><description>Self Deletion Self Deletion - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values String Hashing String Hashing Obfuscation Techniques</description></item><item><title>Self-Deletion Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/self-deletion-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/self-deletion-techniques/</guid><description>Self-Deletion Techniques Self-Deletion Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Forensic Techniques Covering Tracks Techniques Data Destruction Techniques File Time Stomping Log Tampering Techniques Shadow Copy Deletion Timestomping Techniques</description></item><item><title>Send Keystrokes to Remote Server</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/send-keystrokes-to-remote-server/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/send-keystrokes-to-remote-server/</guid><description>Send Keystrokes to Remote Server Send Keystrokes to Remote Server - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Sensors, Actuators, and Driver Components</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/sensors-actuators-and-driver-components/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/sensors-actuators-and-driver-components/</guid><description>Sensors, Actuators, and Driver Components Sensors, Actuators, and Driver Components - input transducers, output actuators, and the driver circuits that interface them to a microcontroller.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Signal Integrity, Protection, and Level Shifting</description></item><item><title>Server Administration</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/server-administration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/server-administration/</guid><description>Server Administration Server Administration - administering and hardening Linux and Windows servers in cloud and on-premises environments.
Firewall Configuration Linux Security and Hardening Linux Server Administration SSH Windows Security and Hardening Windows Server Administration Related Links: IaC Tools</description></item><item><title>Server security</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/server-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/server-security/</guid><description>Server security Server Security - practices and configurations for protecting servers from unauthorized access and exploits.
Related Links: API security best practices Container security best practices CORS CSP Mitigation techniques OWASP risks</description></item><item><title>Server sent events</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/server-sent-events/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/server-sent-events/</guid><description>Server sent events Server-Sent Events - protocol for servers to push real-time updates to clients over HTTP.
Related Links: Backpressure Circuit breakers Event-driven architecture Failure modes Graceful degradation Loadshifting Rate limiting Real time data Realtime short polling Streaming Throttling Websockets</description></item><item><title>Serverless</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/serverless/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/serverless/</guid><description>Serverless Serverless - cloud execution model where developers write functions without managing underlying infrastructure.
Related Links: Architectural patterns Backend Architecture Microservices Monolith Monolith vs Microservices Serverless computing Service mesh architecture Service meshes Service-oriented architecture (SOA) Twelve-factor app</description></item><item><title>Serverless computing</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/serverless-computing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/serverless-computing/</guid><description>Serverless computing Serverless Computing - execution model where cloud providers dynamically manage server allocation per request.
Related Links: Architectural patterns Backend Architecture Microservices Monolith Monolith vs Microservices Serverless Service mesh architecture Service meshes Service-oriented architecture (SOA) Twelve-factor app</description></item><item><title>Serverless Phishing Cloudflare Worker</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/serverless-phishing-cloudflare-worker/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/serverless-phishing-cloudflare-worker/</guid><description>Serverless Phishing Cloudflare Worker Serverless Phishing Cloudflare Worker - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Service Control Manager Interaction</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/service-control-manager-interaction/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/service-control-manager-interaction/</guid><description>Service Control Manager Interaction Service Control Manager Interaction - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Service Creation and Manipulation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/service-creation-and-manipulation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/service-creation-and-manipulation/</guid><description>Service Creation and Manipulation Service Creation and Manipulation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Service Detection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/nmap/service-detection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/nmap/service-detection/</guid><description>Service Detection Service Detection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Nmap Fundamentals Nmap NSE Scripts Port Scanning Techniques</description></item><item><title>Service mesh architecture</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/service-mesh-architecture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/service-mesh-architecture/</guid><description>Service mesh architecture Service Mesh Architecture - infrastructure layer managing service-to-service communication in microservice deployments.
Related Links: Architectural patterns Backend Architecture Microservices Monolith Monolith vs Microservices Serverless Serverless computing Service meshes Service-oriented architecture (SOA) Twelve-factor app</description></item><item><title>Service meshes</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/service-meshes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/service-meshes/</guid><description>Service meshes Service Meshes - dedicated infrastructure layer handling network communication between microservices.
Related Links: Architectural patterns Backend Architecture Microservices Monolith Monolith vs Microservices Serverless Serverless computing Service mesh architecture Service-oriented architecture (SOA) Twelve-factor app</description></item><item><title>Service-oriented architecture (SOA)</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/service-oriented-architecture-soa/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/service-oriented-architecture-soa/</guid><description>Service-oriented architecture (SOA) Service-Oriented Architecture - design pattern organizing software as a collection of interoperable loosely coupled services.
Related Links: Architectural patterns Backend Architecture Microservices Monolith Monolith vs Microservices Serverless Serverless computing Service mesh architecture Service meshes Twelve-factor app</description></item><item><title>Session and Token Security</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/session-and-token-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/session-and-token-security/</guid><description>Session and Token Security Session and Token Security - best practices for securely managing user sessions and authentication tokens.
Related Links: Authentication and Authorization AuthN vs AuthZ Multi-factor authentication (MFA) Password-based authentication Token-based authentication</description></item><item><title>Set Privilege via AdjustTokenPrivileges</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/set-privilege-via-adjusttokenprivileges/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/set-privilege-via-adjusttokenprivileges/</guid><description>Set Privilege via AdjustTokenPrivileges Set Privilege via AdjustTokenPrivileges - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Set Privilege via RtlAdjustPrivilege</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/set-privilege-via-rtladjustprivilege/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/set-privilege-via-rtladjustprivilege/</guid><description>Set Privilege via RtlAdjustPrivilege Set Privilege via RtlAdjustPrivilege - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges SMB Pass the Hash Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Sets</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/sets/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/sets/</guid><description>Sets Sets - unordered collections of unique elements with O(1) average membership testing using Python&amp;rsquo;s built-in set.
Related Links: Arrays Binary Search Trees Graphs Hash Tables Heaps Linked Lists Queues Stacks Strings Trees Tries</description></item><item><title>Settings and Configuration</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/settings-and-configuration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/settings-and-configuration/</guid><description>Settings and Configuration Settings and Configuration - managing Django settings across environments using environment variables and split config files.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Signals Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>SHA-1</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/sha-1/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/sha-1/</guid><description>SHA-1 SHA-1 - cryptographic hash function producing a 160-bit digest, deprecated due to collision vulnerabilities.
Related Links: Argon2 Bcrypt Hashing algorithms MD5 Scrypt SHA-256 TLS</description></item><item><title>SHA-256</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/sha-256/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/sha-256/</guid><description>SHA-256 SHA-256 - secure hash algorithm producing a 256-bit digest, widely used for data integrity and signatures.
Related Links: Argon2 Bcrypt Hashing algorithms MD5 Scrypt SHA-1 TLS</description></item><item><title>Shadow Copy Deletion</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/shadow-copy-deletion/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/shadow-copy-deletion/</guid><description>Shadow Copy Deletion Shadow Copy Deletion - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Forensic Techniques Covering Tracks Techniques Data Destruction Techniques File Time Stomping Log Tampering Techniques Self-Deletion Techniques Timestomping Techniques</description></item><item><title>Sharding</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/sharding/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-performance/sharding/</guid><description>Sharding Sharding - horizontal database partitioning distributing data across multiple servers for scale.
Related Links: Data replication Database index Database scaling Indexes and performance optimization Indexing and Query Performance N+1 query problem Performance tuning and query optimization</description></item><item><title>Share Enumeration</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/share-enumeration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory-enumeration/share-enumeration/</guid><description>Share Enumeration Share Enumeration - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anonymous SMB Login Bind to ATSVC via Named Pipe Bind to BKRP via Named Pipe Bind to EPM via Named Pipe Bind to LSAD via Named Pipe Bind to LSAT via Named Pipe Bind to NRPC via Named Pipe Bind to RPRN via Named Pipe Bind to RRP via Named Pipe Bind to SAMR via Named Pipe Bind to SCMR via Named Pipe Bind to SRVS via Named Pipe Bind to WKST via Named Pipe Check If RPC Server Is Listening C706 Mgmt Connect to SAMR Server MS-SAMR Create a Group MS-SAMR Delete a Group MS-SAMR Domain Join Check Enumerate A Domain Groups Members Enumerate Accounts with Password Never Expiring Enumerate Aliases MS-SAMR Enumerate All Groups in the Domain Enumerate AS-REP Roastable Accounts Enumerate Connections MS-SRVS Enumerate Disabled User Accounts Enumerate Domain Admins Members Enumerate Domain Computers by Keyword Enumerate Domains MS-SAMR Enumerate Electron Fuses Enumerate Group Policy Objects (GPOs) Enumerate Groups MS-SAMR Enumerate Locked Out User Accounts Enumerate Logged On Users Level 0 MS-WKST Enumerate Logged On Users Level 1 MS-WKST Enumerate LSAD Accounts MS-LSAD Enumerate Must Change Password Accounts Enumerate NetBIOS Names Enumerate Organizational Units (OUs) Enumerate Process Memory Maps Enumerate Protected Admin Users Enumerate Remote Host Enumerate RPC Interfaces C706-MGMT Enumerate System Privileges MS-LSAD Enumerate User Service Accounts SPN Enumerate UserPassword Attribute Enumerate Users MS-SAMR Enumerate Users Requiring Smartcard for Logon Enumerate Users Who Never Logged In Enumerate Users with Password Never Expiring Enumerate Users with Password Not Required Enumerate Users with Reversible Encryption Enabled Enumerate Workstation Transports Level 0 MS-WKST Get Current LSA User MS-LSAT Get Domain SID MS-SAMR Get Service Display Name MS-SCMR Get Username Get Workstation Info Level 100 MS-WKST Get Workstation Info Level 101 MS-WKST Get Workstation Info Level 102 MS-WKST LDAP Query Lookup Privilege Value MS-LSAD MS-RPRN Abuse Open a Domain MS-SAMR Open a Group MS-SAMR Open a User Account MS-SAMR Open an Alias MS-SAMR Open LSAD Policy Handle MS-LSAD Process Enumeration Query Active Directory Site Name MS-NRPC Query CFG Status Query DNS Domain Information MS-LSAD Query Domain Controller Information MS-NRPC Query DSSP Operation State MS-DSSP Query DSSP Primary Domain Info MS-DSSP Query DSSP Upgrade Status MS-DSSP Query Extended Service Status MS-SCMR Query RPC Runtime Statistics C706-MGMT Query SMB Share Permissions Query User Account Control MS-SAMR Query User General Info MS-SAMR Query User Home Info MS-SAMR Query User Logon Info MS-SAMR Query User Parameters MS-SAMR Query User Preferences MS-SAMR Query Username Info MS-SAMR Resolve Names to RIDs MS-SAMR Resolve RIDs to Names MS-SAMR Retrieve Domain Computers Retrieve Domain Groups Retrieve Domain User Descriptions Retrieve Domain Users with All Attributes Retrieve MAC Address via NetBIOS Retrieve MS-DS-MachineAccountQuota Retrieve Private Data MS-LSAD Retrieve TXT Records RID to SID MS-SAMR</description></item><item><title>Shared-State Synchronization and Concurrency Safety</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/shared-state-synchronization-and-concurrency-safety/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/shared-state-synchronization-and-concurrency-safety/</guid><description>Shared-State Synchronization and Concurrency Safety Shared-State Synchronization and Concurrency Safety - techniques for safely sharing data between tasks or ISRs, including atomic operations, mutexes, and critical sections.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Superloop Task Priorities and Deadline Handling</description></item><item><title>Shell Execution</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/shell-execution/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/shell-execution/</guid><description>Shell Execution Shell Execution - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Shellcode Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/shellcode-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/shellcode-injection/</guid><description>Shellcode Injection Shellcode Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Shellcode Injection via ZwCreateThreadEx Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/shellcode-injection-via-zwcreatethreadex-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/shellcode-injection-via-zwcreatethreadex-kernel/</guid><description>Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Injection via ZwCreateThreadEx Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Shellcode Injection via ZwCreateThreadEx Kernel Internals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/shellcode-injection-via-zwcreatethreadex-kernel-internals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/shellcode-injection-via-zwcreatethreadex-kernel-internals/</guid><description>Shellcode Injection via ZwCreateThreadEx Kernel Internals Shellcode Injection via ZwCreateThreadEx Kernel Internals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Shellcode Reflective DLL Injection (sRDI)</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/shellcode-reflective-dll-injection-srdi/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/shellcode-reflective-dll-injection-srdi/</guid><description>Shellcode Reflective DLL Injection (sRDI) Shellcode Reflective DLL Injection (sRDI) - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Shellcode Reflective DLL Injection (sRDI) Technique</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/shellcode-reflective-dll-injection-srdi-technique/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/shellcode-reflective-dll-injection-srdi-technique/</guid><description>Shellcode Reflective DLL Injection (sRDI) Technique Shellcode Reflective DLL Injection (sRDI) Technique - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Thread Hijacking Kernel Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Shellcoding a Reverse Shell</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/shellcoding-a-reverse-shell/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/shellcoding-a-reverse-shell/</guid><description>Shellcoding a Reverse Shell Shellcoding a Reverse Shell - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Shellcoding Stager Local Inject</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/shellcoding-stager-local-inject/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/shellcoding-stager-local-inject/</guid><description>Shellcoding Stager Local Inject Shellcoding Stager Local Inject - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Shellcoding Stager Remote Inject</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/shellcoding-stager-remote-inject/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/shellcoding-stager-remote-inject/</guid><description>Shellcoding Stager Remote Inject Shellcoding Stager Remote Inject - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Shift Left Security</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/shift-left-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/shift-left-security/</guid><description>Shift Left Security Shift Left Security - embedding security checks early in development and CI/CD to catch vulnerabilities before production.
Related Links: API Security Arachni Dynamic application security testing (DAST) Nikto Pipeline Security Software composition analysis (SCA) Static application security testing (SAST) W3af</description></item><item><title>short polling</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/short-polling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/short-polling/</guid><description>short polling Short Polling - technique where clients repeatedly request updates from a server at fixed intervals.
Related Links: Backpressure Circuit breakers Event-driven architecture Failure modes Graceful degradation Loadshifting Rate limiting Real time data Realtime Server sent events Streaming Throttling Websockets</description></item><item><title>Side-Channel Attacks</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/side-channel-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/side-channel-attacks/</guid><description>Side-Channel Attacks Side-Channel Attacks - exploitation of information leaked through power consumption, electromagnetic emissions, timing variations, or other physical side channels.
Related Links: Buffer Overflow Firmware Exploitation Network Attacks Physical Attacks</description></item><item><title>SIEM and Tools</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/</guid><description>SIEM and Tools SIEM and Tools - security information and event management platforms and supporting tools used for log aggregation, correlation, and alerting.
Hayabusa Maltego SIEM Fundamentals Splunk Related Links: Detection Engineering Endpoint Security SOC Honeypots Threat Hunting Techniques</description></item><item><title>SIEM Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/siem-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/siem-fundamentals/</guid><description>SIEM Fundamentals SIEM Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Hayabusa Maltego Splunk</description></item><item><title>Signal Integrity, Protection, and Level Shifting</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/signal-integrity-protection-and-level-shifting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/signal-integrity-protection-and-level-shifting/</guid><description>Signal Integrity, Protection, and Level Shifting Signal Integrity, Protection, and Level Shifting - techniques for maintaining clean signal transmission and protecting circuits from voltage mismatches, ESD, and noise.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components</description></item><item><title>SignalObjectAndWait Alertable Function</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/signalobjectandwait-alertable-function/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/signalobjectandwait-alertable-function/</guid><description>SignalObjectAndWait Alertable Function SignalObjectAndWait Alertable Function - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Signals</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/signals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/signals/</guid><description>Signals Signals - Django&amp;rsquo;s observer pattern allowing decoupled components to respond to model events like pre_save and post_save.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Static Files and Media Templates and Template Tags URL Routing User Authentication</description></item><item><title>Single Core vs Multi-Core Architectures</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/single-core-vs-multi-core-architectures/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/single-core-vs-multi-core-architectures/</guid><description>Single Core vs Multi-Core Architectures Single Core vs Multi-Core Architectures - comparison of single-processor and multi-processor embedded designs, including trade-offs in complexity, power, real-time behavior, and inter-core communication.
Related Links: Arm M-profile Bus Fabrics and On-Chip Interconnects CPU Core Concepts Heterogeneous SoCs and Co-processors Memory Architecture Power and Clock Domain Architecture RISC-V</description></item><item><title>Sleep Obfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/</guid><description>Sleep Obfuscation Sleep Obfuscation - techniques that encrypt or hide implant code in memory during beacon sleep intervals to evade memory scanning.
Ekko Sleep Obfuscation with Control Flow Guard Ekko Sleep Obfuscation with Restored File Section Protections Ekko Sleep Obfuscation with RtlEncryptMemory and RtlDecryptMemory Ekko Sleep Obfuscation with Stack Spoofing Heap Encryption with Ekko Sleep Obfuscation Introduction to Ekko Sleep Obfuscation Introduction to Foliage Sleep Obfuscation Introduction to Sleep Obfuscation PEfluctuation Zilean Sleep Obfuscation with Stack Duplication Related Links: Beacon Object Files (BOF) C2 and Networking Credential Dumping Malware Concepts Payload and PE Persistence Process Injection Windows Internals</description></item><item><title>SleepEx Alertable Function</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/sleepex-alertable-function/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/sleepex-alertable-function/</guid><description>SleepEx Alertable Function SleepEx Alertable Function - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>SLI SLO SLA</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/observability-and-sre/sli-slo-sla/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/observability-and-sre/sli-slo-sla/</guid><description>SLI SLO SLA SLI SLO SLA - defining service reliability targets through indicators, objectives, agreements, and error budgets.
Related Links: Incident Management for SRE Monitoring and Observability Monitoring Tools Observability Fundamentals</description></item><item><title>Sliding Window</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/sliding-window/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/sliding-window/</guid><description>Sliding Window Sliding Window - maintaining a variable or fixed-size subarray window to solve substring and subarray problems in O(n).
Related Links: BFS Pattern Binary Search Pattern DFS Pattern Fast and Slow Pointers Merge Intervals Monotonic Stack Top K Elements Two Pointers Union Find</description></item><item><title>SMB Pass the Hash</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/smb-pass-the-hash/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/smb-pass-the-hash/</guid><description>SMB Pass the Hash SMB Pass the Hash - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege Token Impersonation Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>SOAP</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/soap/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/apis/soap/</guid><description>SOAP SOAP - XML-based messaging protocol for exchanging structured information in web services.
Related Links: API API Design API styles GraphQL GraphQL Fundamentals GRPC HTTP and API Fundamentals Open API Specification (OAS) REST REST API Design</description></item><item><title>SOC and Detection Engineering</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/</guid><description>SOC and Detection Engineering SOC and Detection Engineering - the processes and tools used by security operations centers to monitor, detect, triage, and respond to cyber threats.
Detection Engineering Endpoint Security SIEM and Tools SOC Honeypots Threat Hunting Techniques Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>SOC Honeypots</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/soc-honeypots/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/soc-honeypots/</guid><description>SOC Honeypots SOC Honeypots - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Detection Engineering Endpoint Security SIEM and Tools Threat Hunting Techniques</description></item><item><title>Social Engineering</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/</guid><description>Social Engineering Social Engineering - the use of psychological manipulation to deceive individuals into divulging confidential information or performing actions that compromise security.
Automated Social Engineering Techniques Automated Spear Phishing Email Generation Digital Social Engineering Physical Social Engineering Social Engineering Fundamentals Social Engineering Techniques Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Social Engineering Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/social-engineering-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/social-engineering-fundamentals/</guid><description>Social Engineering Fundamentals Social Engineering Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automated Social Engineering Techniques Automated Spear Phishing Email Generation Digital Social Engineering Physical Social Engineering Social Engineering Techniques</description></item><item><title>Social Engineering Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/social-engineering-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/social-engineering-techniques/</guid><description>Social Engineering Techniques Social Engineering Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automated Social Engineering Techniques Automated Spear Phishing Email Generation Digital Social Engineering Physical Social Engineering Social Engineering Fundamentals</description></item><item><title>Software composition analysis (SCA)</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/software-composition-analysis-sca/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/software-composition-analysis-sca/</guid><description>Software composition analysis (SCA) SCA - identifying open-source dependencies and known vulnerabilities in application code and third-party libraries.
Related Links: API Security Arachni Dynamic application security testing (DAST) Nikto Pipeline Security Shift Left Security Static application security testing (SAST) W3af</description></item><item><title>Software Delivery Models</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devops-fundamentals/software-delivery-models/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devops-fundamentals/software-delivery-models/</guid><description>Software Delivery Models Software Delivery Models - comparison of waterfall, agile, and DevOps delivery approaches and their trade-offs.
Related Links: Agile and Scrum DevOps and DevSecOps Fundamentals Phases of DevOps Waterfall vs Agile vs DevOps</description></item><item><title>Software Engineering</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/</guid><description>Software Engineering Software Engineering - practices for writing maintainable, testable, and well-documented Python code.
Code reviews Documentation generation Functional testing Git Integration testing Refactoring Unit testing Related Links: AI and LLMs Language Fundamentals</description></item><item><title>Software Vulnerabilities and Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/software-vulnerabilities-and-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/software-vulnerabilities-and-exploits/</guid><description>Software Vulnerabilities and Exploits Software Vulnerabilities and Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Secure Coding Fundamentals Target-Specific Exploitation Web Based Attacks</description></item><item><title>Solr</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/solr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/solr/</guid><description>Solr Solr - open-source enterprise search platform built on Apache Lucene.
Related Links: Column dbs Document dbs Elasticsearch Graphdbs Key value Memcached Non-relational databases NoSQL databases Redis Relational databases Search engines Time series dbs Vector databases</description></item><item><title>Sorting</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/sorting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/algorithms/sorting/</guid><description>Sorting Sorting - ordering algorithms from O(n²) bubble and insertion sort to O(n log n) merge sort and quicksort in Python.
Related Links: Backtracking Big O Notation Bit Manipulation Divide and Conquer Dynamic Programming Graph Algorithms Greedy Algorithms Recursion Searching</description></item><item><title>SPI</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/spi/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/spi/</guid><description>SPI SPI - high-speed, full-duplex serial protocol for communicating with peripherals using dedicated clock, MOSI, MISO, and chip-select lines.
Related Links: CAN Bus I2C Monodon Firmware UART</description></item><item><title>Splunk</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/splunk/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/splunk/</guid><description>Splunk Splunk - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Hayabusa Maltego SIEM Fundamentals</description></item><item><title>Spoofing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/spoofing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/spoofing/</guid><description>Spoofing Spoofing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Poisoning MITM Network Attacks Overview Packet Sniffing Exploits VLAN Hopping VMescape Exploits</description></item><item><title>SQL</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/</guid><description>SQL SQL - Structured Query Language for defining, querying, and manipulating relational database data.
Advanced SQL Aggregate queries Common table expressions (CTEs) Dynamic SQL Join queries Pivot and unpivot operations Recursive queries Select, insert, delete, update statements Stored procedures and triggers Subqueries Views Window functions Related Links: Database Fundamentals Database Performance Database Types</description></item><item><title>SQL Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/sql-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/sql-injection/</guid><description>SQL Injection SQL Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Buffer Overflows CSRF Directory Traversal Timing Attacks XSS</description></item><item><title>SSH</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/server-administration/ssh/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/server-administration/ssh/</guid><description>SSH SSH - Secure Shell protocol for encrypted remote server access, key-based authentication, and secure tunneling.
Related Links: Firewall Configuration Linux Security and Hardening Linux Server Administration Windows Security and Hardening Windows Server Administration</description></item><item><title>SSL Configuration Comodo SSL</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/ssl-configuration-comodo-ssl/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/ssl-configuration-comodo-ssl/</guid><description>SSL Configuration Comodo SSL SSL Configuration Comodo SSL - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>SSL Configuration Lets Encrypt</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/ssl-configuration-lets-encrypt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/ssl-configuration-lets-encrypt/</guid><description>SSL Configuration Lets Encrypt SSL Configuration Lets Encrypt - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL Web Server Setup Apache PHP Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Stacks</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/stacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/stacks/</guid><description>Stacks Stacks - LIFO data structure supporting push and pop in O(1), implemented with Python lists or collections.deque.
Related Links: Arrays Binary Search Trees Graphs Hash Tables Heaps Linked Lists Queues Sets Strings Trees Tries</description></item><item><title>Stage Early Bird Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/stage-early-bird-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/stage-early-bird-injection/</guid><description>Stage Early Bird Injection Stage Early Bird Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Start a Service MS-SCMR</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/start-a-service-ms-scmr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/start-a-service-ms-scmr/</guid><description>Start a Service MS-SCMR Start a Service MS-SCMR - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Start Local Remote Service</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/start-local-remote-service/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/start-local-remote-service/</guid><description>Start Local Remote Service Start Local Remote Service - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Start Remote Registry</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/start-remote-registry/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/start-remote-registry/</guid><description>Start Remote Registry Start Remote Registry - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service User Access Control (UAC) Virtualization Windows Administration Fundamentals</description></item><item><title>Static Analysis</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/analysis-methods/static-analysis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/analysis-methods/static-analysis/</guid><description>Static Analysis Static Analysis - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Dynamic Analysis Malware Analysis Techniques</description></item><item><title>Static Analysis with Ghidra</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/ghidra/static-analysis-with-ghidra/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/ghidra/static-analysis-with-ghidra/</guid><description>Static Analysis with Ghidra Static Analysis with Ghidra - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ghidra Fundamentals Ghidra Scripting Reverse Engineering with Ghidra</description></item><item><title>Static application security testing (SAST)</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/static-application-security-testing-sast/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/static-application-security-testing-sast/</guid><description>Static application security testing (SAST) SAST - analyzing source code without execution to detect security vulnerabilities early in the development process.
Related Links: API Security Arachni Dynamic application security testing (DAST) Nikto Pipeline Security Shift Left Security Software composition analysis (SCA) W3af</description></item><item><title>Static Files and Media</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/static-files-and-media/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/static-files-and-media/</guid><description>Static Files and Media Static Files and Media - serving CSS, JavaScript, and user-uploaded files using collectstatic and MEDIA_ROOT.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Templates and Template Tags URL Routing User Authentication</description></item><item><title>Steganography</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/steganography/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/steganography/</guid><description>Steganography Steganography - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Cryptographic Algorithms Cryptography Fundamentals Data Anonymization Techniques Data Masking Techniques Secure Communication Techniques</description></item><item><title>Steganography Shellcode Loader</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/steganography-shellcode-loader/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/steganography-shellcode-loader/</guid><description>Steganography Shellcode Loader Steganography Shellcode Loader - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>STM32 Blue Pill</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/stm32-microcontrollers/stm32-blue-pill/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/stm32-microcontrollers/stm32-blue-pill/</guid><description>STM32 Blue Pill STM32 Blue Pill - low-cost STM32F103-based development board commonly used for prototyping and learning embedded development with the STM32 family.
Related Links: STM32L5 Series</description></item><item><title>STM32 Microcontrollers</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/stm32-microcontrollers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/stm32-microcontrollers/</guid><description>STM32 Microcontrollers STM32 Microcontrollers - a family of 32-bit ARM Cortex-M microcontrollers designed by STMicroelectronics with a vendor-specific microcontroller architecture used in a wide range of embedded systems applications.
STM32 Blue Pill STM32L5 Series Related Links: C Language for Embedded Systems Embedded Systems Architectures Embedded Systems Communication Protocols Embedded Systems Execution Models Embedded Systems Exploits Embedded Systems Hardware Embedded Systems Runtime View</description></item><item><title>STM32L5 Series</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/stm32-microcontrollers/stm32l5-series/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/stm32-microcontrollers/stm32l5-series/</guid><description>STM32L5 Series STM32L5 Series - STMicroelectronics ultra-low-power microcontroller series featuring Arm Cortex-M33 with TrustZone and advanced security features.
Related Links: STM32 Blue Pill</description></item><item><title>Stored procedures and triggers</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/stored-procedures-and-triggers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/stored-procedures-and-triggers/</guid><description>Stored procedures and triggers Stored Procedures and Triggers - precompiled SQL code stored in the database for reuse and automation.
Related Links: Advanced SQL Aggregate queries Common table expressions (CTEs) Dynamic SQL Join queries Pivot and unpivot operations Recursive queries Select, insert, delete, update statements Subqueries Views Window functions</description></item><item><title>Streaming</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/streaming/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/streaming/</guid><description>Streaming Streaming - processing and transmitting data continuously as it is generated rather than in batches.
Related Links: Backpressure Circuit breakers Event-driven architecture Failure modes Graceful degradation Loadshifting Rate limiting Real time data Realtime Server sent events short polling Throttling Websockets</description></item><item><title>String Hashing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/string-hashing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/string-hashing/</guid><description>String Hashing String Hashing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing Obfuscation Techniques</description></item><item><title>String Hashing Obfuscation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/string-hashing-obfuscation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/string-hashing-obfuscation/</guid><description>String Hashing Obfuscation String Hashing Obfuscation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>String Hashing Obfuscation Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/string-hashing-obfuscation-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/code-obfuscation/string-hashing-obfuscation-techniques/</guid><description>String Hashing Obfuscation Techniques String Hashing Obfuscation Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AP String Hashing Algorithm AP String Hashing Algorithm ASCII AP String Hashing Syscalls Hash Values NT AP Syscalls Hash Values ZW AP WinAPIs Hash Values Bypass EAF Export Address Filtering CFG Query Code Obfuscation Compile-Time GetModuleHandle Compile-Time GetProcAddress Evasion with File Bloating File Entropy Reduction Techniques FNV1A String Hashing Algorithm FNV1A String Hashing Algorithm ASCII FNV1A String Hashing Syscalls Hash Values FNV1A String Hashing Syscalls Hash Values NT FNV1A Syscalls Hash Values ZW FNV1A WinAPIs Hash Values Function Replacements Function Replacements eg Malloc Strcpy ZeroMemory GoTo Functionality IAT Camouflage IAT Obfuscation Variants JS String Hashing Algorithm JS String Hashing Algorithm ASCII JS String Hashing Syscalls Hash Values NT JS Syscalls Hash Values ZW JS WinAPIs Hash Values Malware Binary Signing Obfuscation Mmgetsystemroutineaddress Replacement String Hashing Kernel Multiple Function Replacements Multiple GetModuleHandle Replacement Functions MurmurHash3 String Hashing Algorithm MurmurHash3 String Hashing Algorithm ASCII MurmurHash3 String Hashing Syscalls Hash Values NT MurmurHash3 Syscalls Hash Values ZW MurmurHash3 WinAPIs Hash Values Obfuscation IPv4fuscation IPv6fuscation UUIDfuscation MACfuscation Payload Obfuscation PJW String Hashing Algorithm PJW String Hashing Algorithm ASCII PJW String Hashing Syscalls Hash Values NT PJW Syscalls Hash Values ZW PJW WinAPIs Hash Values SDBM String Hashing Algorithm SDBM String Hashing Algorithm ASCII SDBM String Hashing Syscalls Hash Values NT SDBM Syscalls Hash Values ZW SDBM WinAPIs Hash Values Self Deletion String Hashing</description></item><item><title>Strings</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/strings/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/strings/</guid><description>Strings Strings - immutable sequences of characters in Python with common manipulation, searching, and pattern-matching techniques.
Related Links: Arrays Binary Search Trees Graphs Hash Tables Heaps Linked Lists Queues Sets Stacks Trees Tries</description></item><item><title>Structured outputs</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/ai-and-llms/structured-outputs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/ai-and-llms/structured-outputs/</guid><description>Structured outputs Structured Outputs - LLM technique for generating output in specific schemas like JSON.
Related Links: Ai in development Embeddings Function calling RAGs</description></item><item><title>Structures, Bitfields, Unions, and Bit Extraction</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/structures-bitfields-unions-and-bit-extraction/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/structures-bitfields-unions-and-bit-extraction/</guid><description>Structures, Bitfields, Unions, and Bit Extraction Structures, Bitfields, Unions, and Bit Extraction - aggregate data types used to model packed hardware data, protocol frames, and register overlays.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Toolchain Fundamentals</description></item><item><title>Subnetting</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-protocols/subnetting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-protocols/subnetting/</guid><description>Subnetting Subnetting - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Handshakes HTTPS Networking Networking Fundamentals</description></item><item><title>Subqueries</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/subqueries/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/subqueries/</guid><description>Subqueries Subqueries - SQL queries nested inside other queries to filter or transform result sets.
Related Links: Advanced SQL Aggregate queries Common table expressions (CTEs) Dynamic SQL Join queries Pivot and unpivot operations Recursive queries Select, insert, delete, update statements Stored procedures and triggers Views Window functions</description></item><item><title>Superloop</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/superloop/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/superloop/</guid><description>Superloop Superloop - the simplest embedded execution model consisting of an infinite loop that polls peripherals and handles all system tasks sequentially.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Task Priorities and Deadline Handling</description></item><item><title>Supply Chain Attacks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/threat-modeling/supply-chain-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/threat-modeling/supply-chain-attacks/</guid><description>Supply Chain Attacks Supply Chain Attacks - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APT OSINT Reconnaissance Techniques Threat Modeling Fundamentals Zero Day</description></item><item><title>SVG Smuggling</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/svg-smuggling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/svg-smuggling/</guid><description>SVG Smuggling SVG Smuggling - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing and Evading SmuggleShield HTML Smuggling HTML Smuggling Strategies Integrating Anti-Bot with HTML Smuggling MOTW Bypass via FileFix Variations WebAssembly Smuggling</description></item><item><title>Syscall Gadget Pattern Scan</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/syscall-gadget-pattern-scan/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/syscall-gadget-pattern-scan/</guid><description>Syscall Gadget Pattern Scan Syscall Gadget Pattern Scan - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Syscall Number Retrieval from NTDLL Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/syscall-number-retrieval-from-ntdll-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/syscall-number-retrieval-from-ntdll-kernel/</guid><description>Syscall Number Retrieval from NTDLL Kernel Syscall Number Retrieval from NTDLL Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Syscalls</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/syscalls/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/syscalls/</guid><description>Syscalls Syscalls - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Syscalls Tampering</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/syscalls-tampering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/syscalls-tampering/</guid><description>Syscalls Tampering Syscalls Tampering - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>System Design</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/</guid><description>System Design System Design - architecture patterns, scalability strategies, and infrastructure practices for backend systems.
Architecture Patterns Scalability and Infrastructure Related Links: Backend Engineering Concurrency Databases Django DSA Python Security Web</description></item><item><title>System Design Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/system-design-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/system-design-fundamentals/</guid><description>System Design Fundamentals System Design Fundamentals - core concepts for designing scalable, reliable, and maintainable distributed systems.
Related Links: Building for scale Caching Caching Fundamentals Docker Instrumentation and monitoring Kubernetes Profiling performance Telemetry</description></item><item><title>SystemFunction040 Encryption Decryption</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/systemfunction040-encryption-decryption/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/systemfunction040-encryption-decryption/</guid><description>SystemFunction040 Encryption Decryption SystemFunction040 Encryption Decryption - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Base N Encoder Entropy Reduction Brute Forcing Key Decryption Caesar Cipher Encryption Decryption ChaCha20 Encryption Algorithm Data Encryption Techniques Encryption Fundamentals Generating Encryption Keys Without WinAPI Calls Random Key Generation RC4 XOR Encryption Decryption via Multi-Byte Key XOR Encryption Decryption via Single Byte</description></item><item><title>Tampered Syscalls via Hardware Breakpoints</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/tampered-syscalls-via-hardware-breakpoints/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/tampered-syscalls-via-hardware-breakpoints/</guid><description>Tampered Syscalls via Hardware Breakpoints Tampered Syscalls via Hardware Breakpoints - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Target-Specific Exploitation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/</guid><description>Target-Specific Exploitation Target-Specific Exploitation - techniques for attacking unique infrastructure and deployment environments beyond standard web applications.
Exploiting Cloud Infrastructure Exploiting Containerized Environments Exploiting Embedded Systems Exploiting Industrial Control Systems (ICS) Exploiting IoT Devices Exploiting Mobile Devices Exploiting Operational Technology (OT) Systems Exploiting Serverless Environments Related Links: Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Web Based Attacks</description></item><item><title>Task Priorities and Deadline Handling</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/task-priorities-and-deadline-handling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/task-priorities-and-deadline-handling/</guid><description>Task Priorities and Deadline Handling Task Priorities and Deadline Handling - assignment of execution priorities to tasks in an RTOS and strategies for meeting hard and soft timing deadlines.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop</description></item><item><title>Task Scheduling and Context Switching</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/runtime-view/task-scheduling-and-context-switching/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/runtime-view/task-scheduling-and-context-switching/</guid><description>Task Scheduling and Context Switching Task Scheduling and Context Switching - mechanisms by which an RTOS saves and restores task state to achieve multitasking on a single processor.
Related Links: Runtime Memory Management</description></item><item><title>TCP Port Scan</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/tcp-port-scan/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/tcp-port-scan/</guid><description>TCP Port Scan TCP Port Scan - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Lookup Host Check ICMP Echo Network Attacks Network Evasion Techniques Network Protocols Port Scanning VPNs Wireless and Physical Attacks</description></item><item><title>Tcpdump</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/wireshark/tcpdump/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/wireshark/tcpdump/</guid><description>Tcpdump Tcpdump - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Network Forensics with Wireshark Protocol Analysis Wireshark Fundamentals</description></item><item><title>Telemetry</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/telemetry/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/scalability-and-infrastructure/telemetry/</guid><description>Telemetry Telemetry - automated collection of performance and usage data from applications for analysis and alerting.
Related Links: Building for scale Caching Caching Fundamentals Docker Instrumentation and monitoring Kubernetes Profiling performance System Design Fundamentals</description></item><item><title>Templates and Template Tags</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/templates-and-template-tags/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/templates-and-template-tags/</guid><description>Templates and Template Tags Templates and Template Tags - Django&amp;rsquo;s template language for rendering HTML with context variables, filters, and custom tags.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media URL Routing User Authentication</description></item><item><title>Terminating a Process Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/terminating-a-process-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/terminating-a-process-kernel/</guid><description>Terminating a Process Kernel Terminating a Process Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Terraform Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/iac-tools/terraform-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/iac-tools/terraform-fundamentals/</guid><description>Terraform Fundamentals Terraform Fundamentals - writing declarative HCL to provision and manage cloud infrastructure with plan, apply, and state workflows.
Related Links: Configuration Management Fundamentals IaC Security Infrastructure as Code Fundamentals</description></item><item><title>Testing</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/pipeline-and-delivery/testing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/pipeline-and-delivery/testing/</guid><description>Testing Testing - automated unit, integration, and end-to-end testing integrated into CI pipelines for continuous quality assurance.
Related Links: CI-CD Fundamentals Deployment Development Phase Release Strategies Requirements and Design Phase</description></item><item><title>Thread Enumeration Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/thread-enumeration-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/thread-enumeration-techniques/</guid><description>Thread Enumeration Techniques Thread Enumeration Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Thread Enumeration via ProcFS</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/thread-enumeration-via-procfs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/thread-enumeration-via-procfs/</guid><description>Thread Enumeration via ProcFS Thread Enumeration via ProcFS - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Thread Enumeration via Syscall</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/thread-enumeration-via-syscall/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/thread-enumeration-via-syscall/</guid><description>Thread Enumeration via Syscall Thread Enumeration via Syscall - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Thread Hijacking Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/thread-hijacking-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/thread-hijacking-kernel/</guid><description>Thread Hijacking Kernel Thread Hijacking Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Threadless Injection VEH Manipulation for Local Code Execution</description></item><item><title>Thread Hijacking Kernel Internals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/thread-hijacking-kernel-internals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/thread-hijacking-kernel-internals/</guid><description>Thread Hijacking Kernel Internals Thread Hijacking Kernel Internals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>Threadless Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/threadless-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/threadless-injection/</guid><description>Threadless Injection Threadless Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel VEH Manipulation for Local Code Execution</description></item><item><title>Threadless Shellcode Injection via HWBPs BOF</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/beacon-object-files-bof/threadless-shellcode-injection-via-hwbps-bof/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/beacon-object-files-bof/threadless-shellcode-injection-via-hwbps-bof/</guid><description>Threadless Shellcode Injection via HWBPs BOF Threadless Shellcode Injection via HWBPs BOF - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: BOF Execution Introduction to BOF LSASS Dump BOF Object File Loader with Module Stomping Writing BOF Files</description></item><item><title>Threat Hunting Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/threat-hunting-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/incident-response-and-forensics/threat-hunting-techniques/</guid><description>Threat Hunting Techniques Threat Hunting Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Forensic Techniques Automated Reverse Engineering Digital Forensics Forensics Hayabusa Incident Response</description></item><item><title>Threat Hunting Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/threat-hunting-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/threat-hunting-techniques/</guid><description>Threat Hunting Techniques Threat Hunting Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Detection Engineering Endpoint Security SIEM and Tools SOC Honeypots</description></item><item><title>Threat Modeling</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/threat-modeling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/threat-modeling/</guid><description>Threat Modeling Threat Modeling - the structured process of identifying, quantifying, and prioritizing potential threats to a system in order to guide security decisions.
APT OSINT Reconnaissance Techniques Supply Chain Attacks Threat Modeling Fundamentals Zero Day Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Windows Security and Administration Wireshark</description></item><item><title>Threat Modeling Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/threat-modeling/threat-modeling-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/threat-modeling/threat-modeling-fundamentals/</guid><description>Threat Modeling Fundamentals Threat Modeling Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APT OSINT Reconnaissance Techniques Supply Chain Attacks Zero Day</description></item><item><title>Throttling</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/throttling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/throttling/</guid><description>Throttling Throttling - limiting the rate of processing to prevent resource exhaustion under heavy load.
Related Links: Backpressure Circuit breakers Event-driven architecture Failure modes Graceful degradation Loadshifting Rate limiting Real time data Realtime Server sent events short polling Streaming Websockets</description></item><item><title>Time series dbs</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/time-series-dbs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/time-series-dbs/</guid><description>Time series dbs Time Series Databases - databases optimized for storing and querying timestamped data sequences.
Related Links: Column dbs Document dbs Elasticsearch Graphdbs Key value Memcached Non-relational databases NoSQL databases Redis Relational databases Search engines Solr Vector databases</description></item><item><title>Timestomping Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/timestomping-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/covering-tracks/timestomping-techniques/</guid><description>Timestomping Techniques Timestomping Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Forensic Techniques Covering Tracks Techniques Data Destruction Techniques File Time Stomping Log Tampering Techniques Self-Deletion Techniques Shadow Copy Deletion</description></item><item><title>Timing Attacks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/timing-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/timing-attacks/</guid><description>Timing Attacks Timing Attacks - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Buffer Overflows CSRF Directory Traversal SQL Injection XSS</description></item><item><title>TLS</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/tls/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/tls/</guid><description>TLS TLS - cryptographic protocol providing secure communication over a network through encryption and certificates.
Related Links: Argon2 Bcrypt Hashing algorithms MD5 Scrypt SHA-1 SHA-256</description></item><item><title>TLS Callbacks for Anti-Debugging</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/tls-callbacks-for-anti-debugging/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/tls-callbacks-for-anti-debugging/</guid><description>TLS Callbacks for Anti-Debugging TLS Callbacks for Anti-Debugging - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques User Interaction Evasion Techniques</description></item><item><title>Token Impersonation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/token-impersonation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/token-impersonation/</guid><description>Token Impersonation Token Impersonation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Manipulation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Token Manipulation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/token-manipulation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/token-manipulation/</guid><description>Token Manipulation Token Manipulation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Querying Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Token Querying</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/token-querying/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/token-querying/</guid><description>Token Querying Token Querying - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Utilizing Hardware Breakpoints for Credential Dumping</description></item><item><title>Token-based authentication</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/token-based-authentication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/token-based-authentication/</guid><description>Token-based authentication Token-Based Authentication - authentication approach using digitally signed tokens instead of server-side sessions.
Related Links: Authentication and Authorization AuthN vs AuthZ Multi-factor authentication (MFA) Password-based authentication Session and Token Security</description></item><item><title>Toolchain Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/toolchain-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/toolchain-fundamentals/</guid><description>Toolchain Fundamentals Toolchain Fundamentals - components of the embedded C toolchain including the compiler, assembler, linker, and object file utilities.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction</description></item><item><title>Top K Elements</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/top-k-elements/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/top-k-elements/</guid><description>Top K Elements Top K Elements - using a min-heap of size K to efficiently find the K largest or most frequent elements.
Related Links: BFS Pattern Binary Search Pattern DFS Pattern Fast and Slow Pointers Merge Intervals Monotonic Stack Sliding Window Two Pointers Union Find</description></item><item><title>Transactions</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/transactions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/transactions/</guid><description>Transactions Transactions - units of work in a database that must execute atomically to maintain consistency.
Related Links: ACID CAP theorem Data constraints Data definition language Data integrity and normalization and security Data manipulation language Databases and Data Modeling Migrations Normalization ORMs Transactions and isolation levels</description></item><item><title>Transactions and isolation levels</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/transactions-and-isolation-levels/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-fundamentals/transactions-and-isolation-levels/</guid><description>Transactions and isolation levels Transactions and Isolation Levels - database transaction guarantees and concurrent access control levels.
Related Links: ACID CAP theorem Data constraints Data definition language Data integrity and normalization and security Data manipulation language Databases and Data Modeling Migrations Normalization ORMs Transactions</description></item><item><title>Trees</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/trees/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/trees/</guid><description>Trees Trees - hierarchical node-based structures with a root and parent-child relationships used for ordered data.
Related Links: Arrays Binary Search Trees Graphs Hash Tables Heaps Linked Lists Queues Sets Stacks Strings Tries</description></item><item><title>Tries</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/tries/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/data-structures/tries/</guid><description>Tries Tries - prefix trees enabling O(m) string search and autocomplete, where m is the length of the key.
Related Links: Arrays Binary Search Trees Graphs Hash Tables Heaps Linked Lists Queues Sets Stacks Strings Trees</description></item><item><title>TrustZone-M</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/trustzone-m/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/trustzone-m/</guid><description>TrustZone-M TrustZone-M - the Cortex-M security extension that partitions the system into Secure and Non-Secure worlds, enabling hardware-enforced isolation between trusted firmware and untrusted application code.
Related Links: Boot Flow on Cortex-M Exceptions Interruptions MPU Usage Patterns NVIC</description></item><item><title>Twelve-factor app</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/twelve-factor-app/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/system-design/architecture-patterns/twelve-factor-app/</guid><description>Twelve-factor app Twelve-Factor App - methodology for building software-as-a-service apps with scalability and maintainability.
Related Links: Architectural patterns Backend Architecture Microservices Monolith Monolith vs Microservices Serverless Serverless computing Service mesh architecture Service meshes Service-oriented architecture (SOA)</description></item><item><title>Two Pointers</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/two-pointers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/two-pointers/</guid><description>Two Pointers Two Pointers - technique using two indices moving toward each other or in the same direction to reduce O(n²) to O(n).
Related Links: BFS Pattern Binary Search Pattern DFS Pattern Fast and Slow Pointers Merge Intervals Monotonic Stack Sliding Window Top K Elements Union Find</description></item><item><title>Typo Squatting</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/digital-social-engineering/typo-squatting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/digital-social-engineering/typo-squatting/</guid><description>Typo Squatting Typo Squatting - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Business Email Compromise Drive-By Downloads File Sharing and Removable Media Phishing Overview Watering Hole Attacks</description></item><item><title>UART</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/uart/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/uart/</guid><description>UART UART - asynchronous serial communication protocol for point-to-point data exchange between microcontrollers and peripherals.
Related Links: CAN Bus I2C Monodon Firmware SPI</description></item><item><title>Ultrasonic Communication Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/ultrasonic-communication-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/ultrasonic-communication-exploits/</guid><description>Ultrasonic Communication Exploits Ultrasonic Communication Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Acoustic Communication Exploits Bluetooth Exploits Deauth Evil Twin Attacks Infrared Exploits Near-Field Communication (NFC) Exploits Power Line Communication Exploits Quantum Communication Exploits Radio Frequency Exploits Rogue Access Point Satellite Communication Exploits Visible Light Communication Exploits WiFi Exploits</description></item><item><title>Unhooking All DLLs</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/unhooking-all-dlls/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/unhooking-all-dlls/</guid><description>Unhooking All DLLs Unhooking All DLLs - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Variants Hardware Hooks NTDLL Unhooking NTDLL Unhooking Variants Utilizing Hardware Breakpoints for Hooking 1 Utilizing Hardware Breakpoints for Hooking 2</description></item><item><title>Union Find</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/union-find/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/dsa/patterns/union-find/</guid><description>Union Find Union Find - disjoint set data structure with near O(1) union and find operations for grouping and connectivity problems.
Related Links: BFS Pattern Binary Search Pattern DFS Pattern Fast and Slow Pointers Merge Intervals Monotonic Stack Sliding Window Top K Elements Two Pointers</description></item><item><title>Unit testing</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/unit-testing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/python/software-engineering/unit-testing/</guid><description>Unit testing Unit Testing - testing individual units of code in isolation to verify their correctness.
Related Links: Code reviews Documentation generation Functional testing Git Integration testing Refactoring</description></item><item><title>Upload File via SMB</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/upload-file-via-smb/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/upload-file-via-smb/</guid><description>Upload File via SMB Upload File via SMB - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>URL Routing</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/url-routing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/url-routing/</guid><description>URL Routing URL Routing - mapping URL patterns to views using URLconf, path converters, and namespaced app URLs.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags User Authentication</description></item><item><title>Urlvoid</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/urlvoid/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/urlvoid/</guid><description>Urlvoid Urlvoid - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analysis Methods Automated Malware Analysis Maltego Memory Leaks Metasploit Reverse Engineering Virustotal</description></item><item><title>User Access Control (UAC)</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/user-access-control-uac/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/user-access-control-uac/</guid><description>User Access Control (UAC) User Access Control (UAC) - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry Virtualization Windows Administration Fundamentals</description></item><item><title>User Administration</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/user-administration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/active-directory/user-administration/</guid><description>User Administration User Administration - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Active Directory Fundamentals Group Administration IAM Policies Identity and Access Management Fundamentals Identity Federation Pass the Hash Privileged Access Management</description></item><item><title>User Authentication</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/django/user-authentication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/django/user-authentication/</guid><description>User Authentication User Authentication - Django&amp;rsquo;s built-in auth system handling login, logout, password hashing, and session management.
Related Links: Class-Based Views Custom User Model Deployment Django Admin Django Security Django Testing Forms and Validation Function-Based Views Middleware Migrations ModelForms Models and ORM Permissions and Groups QuerySets and Managers Settings and Configuration Signals Static Files and Media Templates and Template Tags URL Routing</description></item><item><title>User Interaction Evasion Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/user-interaction-evasion-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/anti-analysis/user-interaction-evasion-techniques/</guid><description>User Interaction Evasion Techniques User Interaction Evasion Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Anti-Debugging Techniques Anti-Debugging via NtGlobalFlag Anti-Debugging via NtSystemDebugControl Anti-Debugging via ProcessDebugFlags Anti-Debugging via Ptrace Anti-Debugging via TLS Callbacks Anti-Forensic Evasion Techniques Anti-Malware Evasion Techniques Anti-Virtualization Techniques Anti-Virus Evasion Techniques Automated Evasion Techniques Avoid Detection Techniques Check Debug Object Handle Check Debug Object Handle via NtQueryInformationProcess Check Hyper-V Status Detect Virtualization Methods Detect Virtualization via Hardware Specification Detect Virtualization via Monitor Resolution Detect Virtualization via User Interaction Detect Virtualized Environments IDS Evasion Techniques IP Address Whitelisting Multiple Anti-Debugging Techniques Network Evasion Techniques Overview Sandbox Evasion Techniques TLS Callbacks for Anti-Debugging</description></item><item><title>User Mode Function Lookup in Process Modules Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/user-mode-function-lookup-in-process-modules-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/user-mode-function-lookup-in-process-modules-kernel/</guid><description>User Mode Function Lookup in Process Modules Kernel User Mode Function Lookup in Process Modules Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>User Mode Process Modules Enumeration Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/user-mode-process-modules-enumeration-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/user-mode-process-modules-enumeration-kernel/</guid><description>User Mode Process Modules Enumeration Kernel User Mode Process Modules Enumeration Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel Using Class in C Kernel WinAPIs PE File Format Overview</description></item><item><title>User Shared Data Delay</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/user-shared-data-delay/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/user-shared-data-delay/</guid><description>User Shared Data Delay User Shared Data Delay - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Using Class in C Kernel</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/using-class-in-c-kernel/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/using-class-in-c-kernel/</guid><description>Using Class in C Kernel Using Class in C Kernel - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel WinAPIs PE File Format Overview</description></item><item><title>Utilizing Hardware Breakpoints for Credential Dumping</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/utilizing-hardware-breakpoints-for-credential-dumping/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/credential-dumping/utilizing-hardware-breakpoints-for-credential-dumping/</guid><description>Utilizing Hardware Breakpoints for Credential Dumping Utilizing Hardware Breakpoints for Credential Dumping - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Clipboard Data Theft Dumping Browser Cookies Chrome Dumping Browser Cookies Firefox Dumping Saved Logins Chrome Dumping Saved Logins Firefox Dumping the SAM Database Dumping the SAM from Disk Dumping the SAM Remotely Enable WDigest Extract WiFi Passwords Fetching LSASS Handle and Bypassing PPL Get Current Token Impersonate Process User Introduction to LSASS Dumping LSASS Dump via Handle Duplication LSASS Dump via MiniDumpWriteDump LSASS Dump via RtlReportSilentProcessExit LSASS Dump via SecLogon Race Condition Privilege Query Read Clipboard Data Set Privilege via AdjustTokenPrivileges Set Privilege via RtlAdjustPrivilege SMB Pass the Hash Token Impersonation Token Manipulation Token Querying</description></item><item><title>Utilizing Hardware Breakpoints for Hooking 1</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/utilizing-hardware-breakpoints-for-hooking-1/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/utilizing-hardware-breakpoints-for-hooking-1/</guid><description>Utilizing Hardware Breakpoints for Hooking 1 Utilizing Hardware Breakpoints for Hooking 1 - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Variants Hardware Hooks NTDLL Unhooking NTDLL Unhooking Variants Unhooking All DLLs Utilizing Hardware Breakpoints for Hooking 2</description></item><item><title>Utilizing Hardware Breakpoints for Hooking 2</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/utilizing-hardware-breakpoints-for-hooking-2/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/obfuscation-and-detection-evasion/ntdll-unhooking-and-api-hooking/utilizing-hardware-breakpoints-for-hooking-2/</guid><description>Utilizing Hardware Breakpoints for Hooking 2 Utilizing Hardware Breakpoints for Hooking 2 - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Variants Hardware Hooks NTDLL Unhooking NTDLL Unhooking Variants Unhooking All DLLs Utilizing Hardware Breakpoints for Hooking 1</description></item><item><title>Utilizing NtCreateUserProcess</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/utilizing-ntcreateuserprocess/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/utilizing-ntcreateuserprocess/</guid><description>Utilizing NtCreateUserProcess Utilizing NtCreateUserProcess - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.exe Executing Commands via IShellDispatch2 COM Interface Executing Files via IHxHelpPaneServer COM Interface Executing Files via IHxInteractiveUser COM Interface Fetch a Pointer to PEB Fetch a Pointer to PEB ARM Fetch a Pointer to TEB Fetch Image DOS Header Fetch Image Headers Fetch Image NT Headers File Entropy Reduction Forwarded Functions Get NTDLL Base Address from Stack Frame Walk GetModuleHandle Replacement GetProcAddress Replacement IAT API Set Resolution Inserting a Custom Section into a PE Local Payload Execution Local PE Execution Local Shellcode Execution Manually Mapping API Set Names NET Assemblies Patching SystemEnvironment.</description></item><item><title>Vector databases</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/vector-databases/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/database-types/vector-databases/</guid><description>Vector databases Vector Databases - databases optimized for storing and querying high-dimensional vector embeddings.
Related Links: Column dbs Document dbs Elasticsearch Graphdbs Key value Memcached Non-relational databases NoSQL databases Redis Relational databases Search engines Solr Time series dbs</description></item><item><title>VEH Manipulation for Local Code Execution</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/veh-manipulation-for-local-code-execution/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/process-injection/veh-manipulation-for-local-code-execution/</guid><description>VEH Manipulation for Local Code Execution VEH Manipulation for Local Code Execution - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Hooking Cross-Architecture Injection x86 to x64 DLL Injection via ZwCreateThreadEx Kernel Function Stomping Ghost Process Injection Ghostly Hollowing Hardware Breakpoint Hooking Library Hardware Breakpoint Threadless Injection Hellshall Herpaderping Hollowing Herpaderping Process Injection KnownDLL Cache Poisoning Injection Library Proxy Loading Local APC Injection Local DLL Injection Local Function Stomping Local Mapping Injection Module Overloading Module Stomping Multiple Anti-Debugging Techniques Multiple Payload Execution Control Methods Patchless Threadless Injection via Hardware Breakpoints Payload Execution Control Payload Execution Control via Events Payload Execution Control via Mutexes Payload Execution Control via Semaphores Payload Execution via Callbacks Payload Execution via CertEnumSystemStore Callback Payload Execution via CertEnumSystemStoreLocation Callback Payload Execution via CopyFileExW Callback Payload Execution via CryptEnumOIDInfo Callback Payload Execution via EnumCalendarInfoW Callback Payload Execution via EnumDesktopsW Callback Payload Execution via EnumDesktopWindows Callback Payload Execution via EnumDirTreeW Callback Payload Execution via EnumDisplayMonitors Callback Payload Execution via EnumerateLoadedModules Callback Payload Execution via EnumFontFamiliesW Callback Payload Execution via EnumFontsW Callback Payload Execution via EnumLanguageGroupLocalesW Callback Payload Execution via EnumObjects Callback Payload Execution via EnumPageFilesW Callback Payload Execution via EnumPropsW Callback Payload Execution via EnumPwrSchemes Callback Payload Execution via EnumResourceTypesW Callback Payload Execution via EnumSystemLocalesEx Callback Payload Execution via EnumThreadWindows Callback Payload Execution via EnumTimeFormatsEx Callback Payload Execution via EnumWindows Callback Payload Execution via EnumWindowStationsW Callback Payload Execution via Fibers Payload Execution via FlsAlloc Callback Payload Execution via ImageGetDigestStream Callback Payload Execution via ImmEnumInputContext Callback Payload Execution via InitOnceExecuteOnce Callback Payload Execution via SymEnumProcesses Callback Payload Execution via SymEnumSourceFiles Callback Payload Execution via SymFindFileInPath Callback Process Hollowing Process Hypnosis Proxy Execute NtAllocateVirtualMemory with Timer APIs C Proxy Execute NtAllocateVirtualMemory with Work Item APIs C Proxy Execute NtCreateThreadEx with Work Item APIs C Reflective DLL Injection Reimplementing Injection via Syscalls Remote APC Injection Remote DLL Injection Remote Function Stomping Remote Mapping Injection Remote Module Stomping Remote Payload Execution via Injection ROP Hellshall RunPE Shellcode Injection Shellcode Injection via ZwCreateThreadEx Kernel Shellcode Reflective DLL Injection (sRDI) Technique Thread Hijacking Kernel Threadless Injection</description></item><item><title>Views</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/views/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/views/</guid><description>Views Views - virtual tables defined by a SQL query providing a simplified or filtered interface to data.
Related Links: Advanced SQL Aggregate queries Common table expressions (CTEs) Dynamic SQL Join queries Pivot and unpivot operations Recursive queries Select, insert, delete, update statements Stored procedures and triggers Subqueries Window functions</description></item><item><title>Virtualization</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/virtualization/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/virtualization/</guid><description>Virtualization Virtualization - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Windows Administration Fundamentals</description></item><item><title>Virustotal</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/virustotal/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-analysis/virustotal/</guid><description>Virustotal Virustotal - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analysis Methods Automated Malware Analysis Maltego Memory Leaks Metasploit Reverse Engineering Urlvoid</description></item><item><title>Visible Light Communication Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/visible-light-communication-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/visible-light-communication-exploits/</guid><description>Visible Light Communication Exploits Visible Light Communication Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Acoustic Communication Exploits Bluetooth Exploits Deauth Evil Twin Attacks Infrared Exploits Near-Field Communication (NFC) Exploits Power Line Communication Exploits Quantum Communication Exploits Radio Frequency Exploits Rogue Access Point Satellite Communication Exploits Ultrasonic Communication Exploits WiFi Exploits</description></item><item><title>VLAN Hopping</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/vlan-hopping/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/vlan-hopping/</guid><description>VLAN Hopping VLAN Hopping - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Poisoning MITM Network Attacks Overview Packet Sniffing Exploits Spoofing VMescape Exploits</description></item><item><title>VMescape Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/vmescape-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/network-attacks/vmescape-exploits/</guid><description>VMescape Exploits VMescape Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Poisoning MITM Network Attacks Overview Packet Sniffing Exploits Spoofing VLAN Hopping</description></item><item><title>Von Neumann</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/memory-architecture/von-neumann/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/memory-architecture/von-neumann/</guid><description>Von Neumann Von Neumann - a processor memory architecture where instructions and data share a single address space and bus, simplifying design at the cost of simultaneous instruction and data access.
Related Links: Harvard</description></item><item><title>VPNs</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/vpns/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/vpns/</guid><description>VPNs VPNs - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DNS Lookup Host Check ICMP Echo Network Attacks Network Evasion Techniques Network Protocols Port Scanning TCP Port Scan Wireless and Physical Attacks</description></item><item><title>W3af</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/w3af/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devsecops/w3af/</guid><description>W3af W3af - open-source web application attack and audit framework for discovering and exploiting web vulnerabilities.
Related Links: API Security Arachni Dynamic application security testing (DAST) Nikto Pipeline Security Shift Left Security Software composition analysis (SCA) Static application security testing (SAST)</description></item><item><title>WaitForMultipleObjectsEx Alertable Function</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/waitformultipleobjectsex-alertable-function/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/waitformultipleobjectsex-alertable-function/</guid><description>WaitForMultipleObjectsEx Alertable Function WaitForMultipleObjectsEx Alertable Function - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>WaitForSingleObjectEx Alertable Function</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/waitforsingleobjectex-alertable-function/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/waitforsingleobjectex-alertable-function/</guid><description>WaitForSingleObjectEx Alertable Function WaitForSingleObjectEx Alertable Function - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Waterfall vs Agile vs DevOps</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devops-fundamentals/waterfall-vs-agile-vs-devops/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/ci-cd/devops-fundamentals/waterfall-vs-agile-vs-devops/</guid><description>Waterfall vs Agile vs DevOps Waterfall vs Agile vs DevOps - evolution from sequential phase-based delivery to iterative and continuous deployment models.
Related Links: Agile and Scrum DevOps and DevSecOps Fundamentals Phases of DevOps Software Delivery Models</description></item><item><title>Watering Hole Attacks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/digital-social-engineering/watering-hole-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/social-engineering/digital-social-engineering/watering-hole-attacks/</guid><description>Watering Hole Attacks Watering Hole Attacks - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Business Email Compromise Drive-By Downloads File Sharing and Removable Media Phishing Overview Typo Squatting</description></item><item><title>Web</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/</guid><description>Web Web - HTTP, APIs, web servers, and protocols powering modern backend web services.
APIs Web Infrastructure Related Links: Backend Engineering Concurrency Databases Django DSA Python Security System Design</description></item><item><title>Web Based Attacks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/web-based-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/web-based-attacks/</guid><description>Web Based Attacks Web Based Attacks - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation</description></item><item><title>Web Infrastructure</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/</guid><description>Web Infrastructure Web Infrastructure - servers, protocols, and network primitives that underpin web application delivery.
Apache Caddy Domain name Domain name system Http caching Https Nginx Fundamentals Web servers Related Links: APIs</description></item><item><title>Web Security</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/</guid><description>Web Security Web Security - browser and server-side protections against common web application vulnerabilities and attacks.
API security best practices Container security best practices CORS CSP Mitigation techniques OWASP risks Server security Related Links: Authentication Authorization Cryptography</description></item><item><title>Web Server Setup Apache PHP</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/web-server-setup-apache-php/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/web-server-setup-apache-php/</guid><description>Web Server Setup Apache PHP Web Server Setup Apache PHP - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Nginx Flask Wildcard Certificate via Lets Encrypt</description></item><item><title>Web Server Setup Nginx Flask</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/web-server-setup-nginx-flask/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/web-server-setup-nginx-flask/</guid><description>Web Server Setup Nginx Flask Web Server Setup Nginx Flask - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Wildcard Certificate via Lets Encrypt</description></item><item><title>Web servers</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/web-servers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/web/web-infrastructure/web-servers/</guid><description>Web servers Web Servers - software that serves web content over HTTP by handling incoming requests and sending responses.
Related Links: Apache Caddy Domain name Domain name system Http caching Https Nginx Fundamentals</description></item><item><title>WebAssembly Smuggling</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/webassembly-smuggling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/html-smuggling/webassembly-smuggling/</guid><description>WebAssembly Smuggling WebAssembly Smuggling - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Analyzing and Evading SmuggleShield HTML Smuggling HTML Smuggling Strategies Integrating Anti-Bot with HTML Smuggling MOTW Bypass via FileFix Variations SVG Smuggling</description></item><item><title>Websockets</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/websockets/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/concurrency/websockets/</guid><description>Websockets WebSockets - protocol providing full-duplex communication channels over a single TCP connection.
Related Links: Backpressure Circuit breakers Event-driven architecture Failure modes Graceful degradation Loadshifting Rate limiting Real time data Realtime Server sent events short polling Streaming Throttling</description></item><item><title>WiFi Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/wifi-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/wifi-exploits/</guid><description>WiFi Exploits WiFi Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Acoustic Communication Exploits Bluetooth Exploits Deauth Evil Twin Attacks Infrared Exploits Near-Field Communication (NFC) Exploits Power Line Communication Exploits Quantum Communication Exploits Radio Frequency Exploits Rogue Access Point Satellite Communication Exploits Ultrasonic Communication Exploits Visible Light Communication Exploits</description></item><item><title>Wildcard Certificate via Lets Encrypt</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/wildcard-certificate-via-lets-encrypt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/infrastructure/wildcard-certificate-via-lets-encrypt/</guid><description>Wildcard Certificate via Lets Encrypt Wildcard Certificate via Lets Encrypt - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Automate Phishing Infrastructure Ansible Automate Phishing Infrastructure Terraform Database Setup MySQL Deploying Phishing Infrastructure Domain and DNS Configuration Improving Domain Reputation Domain Aging Improving Domain Reputation Domain Categorization Improving Domain Reputation Web Traffic Introduction to Caddy OPSEC Failure Directory Listing Performing Input Validation Protecting Phishing Servers via Caddy Protecting Phishing Servers via Mod Rewrite Secure SSH Configuration Securing Server Blocking Direct IP Access Securing Server Removing Verbose Information Securing Server Restrict HTTP Access Securing Server via Cloudflare Serverless Phishing Cloudflare Worker SSL Configuration Comodo SSL SSL Configuration Lets Encrypt Web Server Setup Apache PHP Web Server Setup Nginx Flask</description></item><item><title>WinAPIs and PE File Format</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/winapis-and-pe-file-format/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/winapis-and-pe-file-format/</guid><description>WinAPIs and PE File Format WinAPIs and PE File Format - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>WinAPIs PE File Format Overview</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/winapis-pe-file-format-overview/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/winapis-pe-file-format-overview/</guid><description>WinAPIs PE File Format Overview WinAPIs PE File Format Overview - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel</description></item><item><title>Window functions</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/window-functions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/databases/sql/window-functions/</guid><description>Window functions Window Functions - SQL functions performing calculations across rows related to the current row.
Related Links: Advanced SQL Aggregate queries Common table expressions (CTEs) Dynamic SQL Join queries Pivot and unpivot operations Recursive queries Select, insert, delete, update statements Stored procedures and triggers Subqueries Views</description></item><item><title>Windows Administration</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/</guid><description>Windows Administration Windows Administration - core Windows system administration tasks including user management, registry operations, services, and remote access.
Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization Windows Administration Fundamentals Related Links: Active Directory Active Directory Enumeration Create Shortcut via IShellLink COM Interface File Creation File Operations Windows Exploitation Write File to Disk</description></item><item><title>Windows Administration Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/windows-administration-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-administration/windows-administration-fundamentals/</guid><description>Windows Administration Fundamentals Windows Administration Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add User to Local Group Check Process Admin Privileges Kernel Check Process Elevation Status Check Token Elevation Status via NtQueryInformationToken Create Local Remote Service Create Local User Create Local User Account Create Remote Service Delete Remote Service Disk Interaction Enable Disable RDP Enable Disable Restricted Admin Enable Remote Desktop via Registry Get Domain SID Hostname Verification Hypervisors Permissions PowerShell PowerShell Security Print OS Version Query Extended Service Status Query Remote Registry Key Query Remote Service Query Service Configuration MS-SCMR Read Process Memory via Pread Registry Interaction Registry Key Interaction Registry Modifications Scheduled Tasks and Cron Jobs Service Control Manager Interaction Service Creation and Manipulation Start a Service MS-SCMR Start Local Remote Service Start Remote Registry User Access Control (UAC) Virtualization</description></item><item><title>Windows DLL Template</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/windows-dll-template/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/windows-dll-template/</guid><description>Windows DLL Template Windows DLL Template - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Worm-Like Propagation XLL Templates</description></item><item><title>Windows Exploitation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/</guid><description>Windows Exploitation Windows Exploitation - techniques for escalating privileges, moving laterally, and maintaining persistence in Windows environments post-compromise.
AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Persistence via Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch Related Links: Active Directory Active Directory Enumeration Create Shortcut via IShellLink COM Interface File Creation File Operations Windows Administration Write File to Disk</description></item><item><title>Windows Internals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/windows-internals/</guid><description>Windows Internals Windows Internals - foundational knowledge of Windows architecture, kernel structures, API resolution, and PE file format for malware development.
API Set Resolution Blocking Driver Loading Kernel Check If Process Is WOW64 Cleaning Driver Artifacts from Memory Dumps Kernel Disabling the Debugger Kernel DLL Injection via ZwCreateThreadEx Kernel Internals Elevate Process to SYSTEM Kernel Enable SeDebugPrivilege Hide Process Kernel Internals Hide Thread Kernel Internals Indirect Syscalls Kernel Modules Enumeration via AuxKlibQueryModuleInformation Kernel Modules Enumeration via PsLoadedModuleList Kernel Modules Enumeration via ZwQuerySystemInformation Mmgetsystemroutineaddress Replacement with String Hashing Kernel Process Enumeration via ZwQuerySystemInformation Kernel Reading a File Kernel Retrieving Kernel Version Retrieving Process Identifier Kernel Retrieving Process Image Base Address Kernel Retrieving Process Name Kernel Retrieving Process Parent ID Kernel Retrieving Process Session ID Kernel Retrieving the Address of an Unexported ZW API Kernel Shellcode Injection via ZwCreateThreadEx Kernel Internals Syscall Gadget Pattern Scan Syscall Number Retrieval from NTDLL Kernel Syscalls Tampering Tampered Syscalls via Hardware Breakpoints Terminating a Process Kernel Thread Enumeration Techniques Thread Enumeration via ProcFS Thread Enumeration via Syscall Thread Hijacking Kernel Internals User Mode Function Lookup in Process Modules Kernel User Mode Process Modules Enumeration Kernel Using Class in C Kernel WinAPIs PE File Format Overview Related Links: Beacon Object Files (BOF) C2 and Networking Credential Dumping Malware Concepts Payload and PE Persistence Process Injection Sleep Obfuscation</description></item><item><title>Windows Security and Administration</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/</guid><description>Windows Security and Administration Windows Security and Administration - Windows OS administration, Active Directory management, security hardening, and post-exploitation techniques.
Active Directory Active Directory Enumeration Create Shortcut via IShellLink COM Interface File Creation File Operations Windows Administration Windows Exploitation Write File to Disk Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Wireshark</description></item><item><title>Windows Security and Hardening</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/server-administration/windows-security-and-hardening/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/server-administration/windows-security-and-hardening/</guid><description>Windows Security and Hardening Windows Security and Hardening - securing Windows servers through Group Policy, patch management, and audit configuration.
Related Links: Firewall Configuration Linux Security and Hardening Linux Server Administration SSH Windows Server Administration</description></item><item><title>Windows Server Administration</title><link>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/server-administration/windows-server-administration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/devops-and-platform-engineering/infrastructure-as-code/server-administration/windows-server-administration/</guid><description>Windows Server Administration Windows Server Administration - managing Windows Server environments including Active Directory, IIS, and PowerShell automation.
Related Links: Firewall Configuration Linux Security and Hardening Linux Server Administration SSH Windows Security and Hardening</description></item><item><title>Wireless and Physical Attacks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/network-security/wireless-and-physical-attacks/</guid><description>Wireless and Physical Attacks Wireless and Physical Attacks - techniques exploiting wireless communications, radio frequencies, and physical-layer channels to compromise systems.
Acoustic Communication Exploits Bluetooth Exploits Deauth Evil Twin Attacks Infrared Exploits Near-Field Communication (NFC) Exploits Power Line Communication Exploits Quantum Communication Exploits Radio Frequency Exploits Rogue Access Point Satellite Communication Exploits Ultrasonic Communication Exploits Visible Light Communication Exploits WiFi Exploits Related Links: DNS Lookup Host Check ICMP Echo Network Attacks Network Evasion Techniques Network Protocols Port Scanning TCP Port Scan VPNs</description></item><item><title>Wireshark</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/wireshark/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/wireshark/</guid><description>Wireshark Wireshark - a widely used network protocol analyzer for capturing and interactively inspecting network traffic in real time.
Network Forensics with Wireshark Protocol Analysis Tcpdump Wireshark Fundamentals Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration</description></item><item><title>Wireshark Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/wireshark/wireshark-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/wireshark/wireshark-fundamentals/</guid><description>Wireshark Fundamentals Wireshark Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Network Forensics with Wireshark Protocol Analysis Tcpdump</description></item><item><title>WMI Query</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/wmi-query/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/c2-and-networking/wmi-query/</guid><description>WMI Query WMI Query - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Alertable Functions APC Queues Automated C2 Infrastructure Setup C2 Communication Techniques Command and Control Patterns Custom SMB Client Data Exfiltration Techniques Domain Generation Algorithms (DGA) Domain Registration Kill Switch Download and Upload via SMB Download File via BITS Execute Shell Command Fetch Payload via URL Fetch Payload via URL using IWinHttpRequest COM Interface File Upload via SMB Get Payload from URL Introduction to Havoc C2 List SMB Files Malware Kill Date Malware Working Hours MsgWaitForMultipleObjectsEx Alertable Function Multiple Alertable Functions Named Pipes PowerShell Execution via .</description></item><item><title>Worm-Like Propagation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/worm-like-propagation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/worm-like-propagation/</guid><description>Worm-Like Propagation Worm-Like Propagation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template XLL Templates</description></item><item><title>Write File to Disk</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/write-file-to-disk/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/write-file-to-disk/</guid><description>Write File to Disk Write File to Disk - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Active Directory Active Directory Enumeration Create Shortcut via IShellLink COM Interface File Creation File Operations Windows Administration Windows Exploitation</description></item><item><title>Writing BOF Files</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/beacon-object-files-bof/writing-bof-files/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/beacon-object-files-bof/writing-bof-files/</guid><description>Writing BOF Files Writing BOF Files - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: BOF Execution Introduction to BOF LSASS Dump BOF Object File Loader with Module Stomping Threadless Shellcode Injection via HWBPs BOF</description></item><item><title>Writing Custom Shellcode</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/writing-custom-shellcode/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/writing-custom-shellcode/</guid><description>Writing Custom Shellcode Writing Custom Shellcode - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>Writing to Process Memory via APCs</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/writing-to-process-memory-via-apcs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/payload-and-pe/writing-to-process-memory-via-apcs/</guid><description>Writing to Process Memory via APCs Writing to Process Memory via APCs - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APC Injection via Write to Process Memory Automated Payload Generation Techniques Building a Loader Building a PE Packer Building an Evasive DLL Payload Loader Command Line Argument Spoofing Compile-Time Hash Obfuscation Compile-Time String Encryption Controlling Payload Execution CRT Library Removal CRT Removal Custom WinAPI Functions DLL Sideloading via at.</description></item><item><title>XLL Templates</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/xll-templates/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/malware-concepts/xll-templates/</guid><description>XLL Templates XLL Templates - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Add Binary Icon AI-Generated Malware Assembly Automated Botnet Development Automated Cryptojacking Malware Development Automated Fileless Malware Development Automated Malware Delivery Techniques Automated Malware Distribution Techniques Automated Payload Generation Automated Polymorphic and Metamorphic Malware Development AV Detection Mechanisms Binary Metadata Modification Binary Properties Icon Metadata Block DLL Policy Bring Your Own File Extension Bring Your Own Protocol Handler Bring Your Own Vulnerable Driver (BYOVD) Building a DRM-Equipped Malware C Programming Capturing and Saving Screenshots into Memory Create a DLL Template Cryptojacking Exploits Custom Built Tools Demonstration Developing a Keylogger DLL Sideloading for EDR Evasion DLL Sideloading Overview DLL Sideloading Practical Example DRM-Equipped Malware Encryption and Packing Encryption and Packing Techniques Exploiting EDR for Evasion Fileless Malware Hide Console Window Hide Process Kernel Hide Thread Kernel Introduction to DLL Sideloading Introduction to EDRs Introduction to Keylogging Introduction to MASM Assembly Introduction to the Windows OS Malware Binary Signing Malware Compiling Malware Development Techniques Malware Directory Placement Metamorphic Malware Monitoring Display State Kernel Monitoring User Presence Kernel More C Fundamentals Persistence Techniques Overview Polymorphic and Metamorphic Techniques Polymorphic Malware Print a Hexadecimal Array Print OS Version Process Creation Python for Malware Development Rootkits Rootkits and Bootkits Screen Capture to BMP Windows DLL Template Worm-Like Propagation</description></item><item><title>XOR Encryption Decryption via Multi-Byte Key</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/xor-encryption-decryption-via-multi-byte-key/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/xor-encryption-decryption-via-multi-byte-key/</guid><description>XOR Encryption Decryption via Multi-Byte Key XOR Encryption Decryption via Multi-Byte Key - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Base N Encoder Entropy Reduction Brute Forcing Key Decryption Caesar Cipher Encryption Decryption ChaCha20 Encryption Algorithm Data Encryption Techniques Encryption Fundamentals Generating Encryption Keys Without WinAPI Calls Random Key Generation RC4 SystemFunction040 Encryption Decryption XOR Encryption Decryption via Single Byte</description></item><item><title>XOR Encryption Decryption via Single Byte</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/xor-encryption-decryption-via-single-byte/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/encryption/xor-encryption-decryption-via-single-byte/</guid><description>XOR Encryption Decryption via Single Byte XOR Encryption Decryption via Single Byte - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AES Base N Encoder Entropy Reduction Brute Forcing Key Decryption Caesar Cipher Encryption Decryption ChaCha20 Encryption Algorithm Data Encryption Techniques Encryption Fundamentals Generating Encryption Keys Without WinAPI Calls Random Key Generation RC4 SystemFunction040 Encryption Decryption XOR Encryption Decryption via Multi-Byte Key</description></item><item><title>XSS</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/xss/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/xss/</guid><description>XSS XSS - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Buffer Overflows CSRF Directory Traversal SQL Injection Timing Attacks</description></item><item><title>Zero Day</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/threat-modeling/zero-day/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/threat-modeling/zero-day/</guid><description>Zero Day Zero Day - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: APT OSINT Reconnaissance Techniques Supply Chain Attacks Threat Modeling Fundamentals</description></item><item><title>Zero Trust Architecture</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/zero-trust-architecture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/firewalls/zero-trust-architecture/</guid><description>Zero Trust Architecture Zero Trust Architecture - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: DMZ Firewalls Overview Honeypots Jump Server Microsegmentation Network Segmentation Port Blocking</description></item><item><title>Zilean Sleep Obfuscation with Stack Duplication</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/zilean-sleep-obfuscation-with-stack-duplication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/sleep-obfuscation/zilean-sleep-obfuscation-with-stack-duplication/</guid><description>Zilean Sleep Obfuscation with Stack Duplication Zilean Sleep Obfuscation with Stack Duplication - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Ekko Sleep Obfuscation with Control Flow Guard Ekko Sleep Obfuscation with Restored File Section Protections Ekko Sleep Obfuscation with RtlEncryptMemory and RtlDecryptMemory Ekko Sleep Obfuscation with Stack Spoofing Heap Encryption with Ekko Sleep Obfuscation Introduction to Ekko Sleep Obfuscation Introduction to Foliage Sleep Obfuscation Introduction to Sleep Obfuscation PEfluctuation</description></item></channel></rss>