This is the infosec blog of Aussie PatH, opinions are my own. Code and Examples are on Github.
Posts
Gaining Threat-Intelligence the REALLY dodgy way
Linux cloud memory forensics tutorial
Tool - Use TouchID and the Secure Enclave from the commandline
Commandline Cloaking 2 - Tetragon and Nim
Tool - Using AWS Lambdas to distribute WebRequests
SIEMCraft - Security detection monitoring using Minecraft
Tool - Create run VPNs in various clouds
Tool - Use Terraform and Bitcoin to run VMs
Commandline Cloaking and Sysmon for Linux
Hunting Sliver
DEF CON 29: Bad BPF - Warping reality using eBPF
Detecting Kernel Hooking using eBPF
ETW on Windows 11 - Initial thoughts
Gaining Threat-Intelligence the dodgy way
Mapping It Out: Analyzing the Security of eBPF Maps
Using eBPF to uncover in-memory loading
Experimenting with Protected Processes and Threat-Intelligence
Hunting Koadic Pt. 2 - JARM Fingerprinting
Tracking Windows Updates with Git and CI
Getting more out of the Windows Filtering ETW Events
Introducing Sealighter - Sysmon-Like research tool for ETW
Experimenting with Ghidra Scripting
Using Python Bandit to find dodgy packages
Hunting Koadic across Shodan
subscribe via RSS