<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>NTNINJA</title><link>https://ntninja.com/</link><description>Recent content on NTNINJA</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Ryan Johnson</copyright><lastBuildDate>Thu, 05 Mar 2026 01:00:00 +0000</lastBuildDate><atom:link href="https://ntninja.com/index.xml" rel="self" type="application/rss+xml"/><item><title>dnre-mcp 0.1.0 — .NET Reverse Engineering via MCP</title><link>https://ntninja.com/posts/dnre-mcp-release/</link><pubDate>Thu, 05 Mar 2026 01:00:00 +0000</pubDate><guid>https://ntninja.com/posts/dnre-mcp-release/</guid><description>&lt;p&gt;I just released &lt;a href="https://ntninja.com/dnre-mcp/" &gt;dnre-mcp&lt;/a&gt; 0.1.0, a standalone MCP server for .NET assembly reverse engineering and decompilation.&lt;/p&gt;

&lt;h2 class="relative group"&gt;What It Does
 &lt;div id="what-it-does" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#what-it-does" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;dnre-mcp lets AI assistants load, inspect, and decompile .NET assemblies directly through the Model Context Protocol. It exposes 10 tools covering assembly loading, type and method discovery, namespace browsing, and full C# source decompilation. Under the hood it uses ICSharpCode.Decompiler, the same engine that powers ILSpy.&lt;/p&gt;</description></item><item><title>WEDP 1.0.0-rc1 and dbgeng-mcp 0.1.0</title><link>https://ntninja.com/posts/wedp-and-dbgeng-mcp-releases/</link><pubDate>Thu, 12 Feb 2026 01:00:00 +0000</pubDate><guid>https://ntninja.com/posts/wedp-and-dbgeng-mcp-releases/</guid><description>&lt;p&gt;Quick update on two projects that have been getting a lot of my attention lately.&lt;/p&gt;

&lt;h2 class="relative group"&gt;WEDP 1.0.0-rc1
 &lt;div id="wedp-100-rc1" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#wedp-100-rc1" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://ntninja.com/wedp/" &gt;WEDP (Windows Exploit Development Plugin)&lt;/a&gt; has hit its first release candidate.
If you are not familiar with it, WEDP is a native WinDbg extension I built for exploit development workflows.
It provides ROP/SEH/stack-pivot gadget search, cyclic pattern utilities, module protection enumeration, inline assembly, and a bunch of other stuff you would normally need multiple tools for.
I wrote a &lt;a href="https://ntninja.com/posts/windbg-mcp-with-wedp/" &gt;post&lt;/a&gt; recently on using it with an MCP server and that really pushed me to clean things up and get a proper release out.&lt;/p&gt;</description></item><item><title>WinDBG MCP with WEDP</title><link>https://ntninja.com/posts/windbg-mcp-with-wedp/</link><pubDate>Fri, 06 Feb 2026 09:00:00 -0500</pubDate><guid>https://ntninja.com/posts/windbg-mcp-with-wedp/</guid><description>&lt;p&gt;I have been late to the game with adopting GenAI into my workflow, but we are at full steam now.
I have slowly been adding it into my daily routines to see where I can gain efficiency leveraging this new tech.
One of the big areas I am playing with right now is for writing Windows based CTF challenges, and now in the past few days, seeing how I can leverage GenAI for writing POCs for these new challenges.
In this post we are going to walk through my initial setup for using the &lt;a href="https://github.com/NadavLor/windbg-ext-mcp" target="_blank" rel="noreferrer"&gt;WinDbg EXT MCP&lt;/a&gt; to control a windbg instance that has the extension I wrote a long time ago, &lt;a href="https://gitlab.com/ntninja-dev/windows-exploit-development/wedp" target="_blank" rel="noreferrer"&gt;WEDP (Windows Exploit Development Plugin)&lt;/a&gt;, to improve the process of going from crash to POC.&lt;/p&gt;</description></item><item><title>Protecting Repos with Encrypted GIT</title><link>https://ntninja.com/posts/encrypted-git/</link><pubDate>Mon, 21 Nov 2022 15:00:00 -0500</pubDate><guid>https://ntninja.com/posts/encrypted-git/</guid><description>&lt;p&gt;Open source software development is great, and there exists an abundance of difference git solutions to create public and private repositories for collaboration and distribution.
Private repos give you an extra layer of control by not allowing your code base to be seen by the public.
Occasionally you may have a project that you want to be able to collaborate with a limited set of remote people, and want restrict the possiblity of your source being viewed, even by the git service provider.
None of the commercial git providers have a good solution for this currently, at least that I know of.&lt;/p&gt;</description></item><item><title>Installing Exchange 2019 on Server 2019 for Lab</title><link>https://ntninja.com/posts/install-exchange2k19-server2k19/</link><pubDate>Sat, 08 Oct 2022 09:00:00 -0500</pubDate><guid>https://ntninja.com/posts/install-exchange2k19-server2k19/</guid><description>&lt;p&gt;Right off the bat, if you are looking for resources on how to set up or manange exchange in a production environment then stop reading, this installation was purely for a lab environment to practice red team techniques and play with some recent exploits.&lt;/p&gt;
&lt;p&gt;As someone with 0 training in windows adminstration, getting exchange working in my lab has been a long and painful experience.
It ended up just taking a lot of research to find a web site with a walk through that finally worked for me to get a basic setup.
I will admit that I dont fully understand exactly what every command is completing in the setup process, but its not really necessary for the my use cases.
This 5 part guide from &lt;a href="https://www.nucleustechnologies.com/blog/important-points-to-consider-before-installation/" target="_blank" rel="noreferrer"&gt;nucleus technologies&lt;/a&gt; is what I followed for the most part and has much more detail, but I will add some additional links for dependencies to get everything in one place.&lt;/p&gt;</description></item><item><title>.NET Deserialization Challenge 1</title><link>https://ntninja.com/posts/dotnet-deserialization-challenge1/</link><pubDate>Wed, 28 Sep 2022 09:00:00 -0500</pubDate><guid>https://ntninja.com/posts/dotnet-deserialization-challenge1/</guid><description>&lt;h2 class="relative group"&gt;&lt;a href="https://ntninja.com/downloads/challenges/deserialization_challenge1.zip" &gt;Challenge Download&lt;/a&gt;
 &lt;div id="challenge-download" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#challenge-download" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;In this challenge you are given a single binary.
The binary can simply take in user input to serialize an object to a file or take in a file and deserialize the object and print the contents.
Your goal is to get arbitrary command execution using any tools necessary from the binary.&lt;/p&gt;
&lt;p&gt;Good Luck!&lt;/p&gt;</description></item><item><title>.NET Deserialization Challenge 2</title><link>https://ntninja.com/posts/dotnet-deserialization-challenge2/</link><pubDate>Wed, 28 Sep 2022 09:00:00 -0500</pubDate><guid>https://ntninja.com/posts/dotnet-deserialization-challenge2/</guid><description>&lt;h2 class="relative group"&gt;&lt;a href="https://ntninja.com/downloads/challenges/deserialization_challenge2.zip" &gt;Challenge Download&lt;/a&gt;
 &lt;div id="challenge-download" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#challenge-download" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;

&lt;h2 class="relative group"&gt;Wacky File Transfer
 &lt;div id="wacky-file-transfer" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#wacky-file-transfer" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;In this challenge you are presented with the Wacky File Transfer client &lt;code&gt;wft_client.exe&lt;/code&gt; and Wacky File Transfer server &lt;code&gt;wft_server.exe&lt;/code&gt;.
The helper library &lt;code&gt;wft_helpers.dll&lt;/code&gt; that is used by both the client and the server is also included and must be present in the same directory as the client or server to execute them.&lt;/p&gt;</description></item><item><title>rundll... more like fundll</title><link>https://ntninja.com/posts/rundll-fundll/</link><pubDate>Sun, 25 Sep 2022 09:00:00 -0500</pubDate><guid>https://ntninja.com/posts/rundll-fundll/</guid><description>&lt;p&gt;Have you ever written a DLL that had standalone functionality and wasn&amp;rsquo;t meant to be used as a library?
Considering that library is in the name, this idea seems contrary to what a library should be.
Well, you can thank Microsoft for providing a way to execute standalone functionality from a DLL.
Not only did they do that, they also provide DLLs with functionality that you need this utility to run!!!
Say hello to rundll32, pronounced run dull all smashed as one word in some circles.&lt;/p&gt;</description></item><item><title>About</title><link>https://ntninja.com/about/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://ntninja.com/about/</guid><description>&lt;p&gt;Software Developer, Security Researcher, Extreme Sports Athlete.&lt;/p&gt;
&lt;p&gt;My primary technical interests include Windows Internals research, Win32 Dev, Windows Kernel Dev, Windows VR and Exploit Dev.
I also enjoy learning about and testing red team tools, doing CTF style challenges and continuing to grow my knowledge of the security field.
I love to share my passion and teach what I have learned about Windows to others.&lt;/p&gt;</description></item><item><title>dbgeng-mcp</title><link>https://ntninja.com/dbgeng-mcp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://ntninja.com/dbgeng-mcp/</guid><description>&lt;h2 class="relative group"&gt;Links
 &lt;div id="links" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#links" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.com/ntninja-dev/dbgeng-mcp" target="_blank" rel="noreferrer"&gt;GitLab Repository&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 class="relative group"&gt;Overview
 &lt;div id="overview" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#overview" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;dbgeng-mcp is a Model Context Protocol (MCP) server that bridges AI assistants to the Windows Debugging Engine (&lt;code&gt;dbgeng.dll&lt;/code&gt;). Built with Python and a native C++ extension (pybind11), it exposes debugger functionality as MCP tools so that LLM-based agents can launch, attach to, and inspect processes through natural language. The project is currently alpha software under active development and is MIT licensed.&lt;/p&gt;</description></item><item><title>dnre-mcp</title><link>https://ntninja.com/dnre-mcp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://ntninja.com/dnre-mcp/</guid><description>&lt;h2 class="relative group"&gt;Links
 &lt;div id="links" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#links" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.com/ntninja-dev/dnre-mcp" target="_blank" rel="noreferrer"&gt;GitLab Repository&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 class="relative group"&gt;Overview
 &lt;div id="overview" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#overview" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;dnre-mcp is a Model Context Protocol (MCP) server for .NET assembly reverse engineering and decompilation. It gives AI assistants like Claude the ability to load, analyze, and decompile .NET assemblies without needing a GUI tool like dnSpy or ILSpy open. Built in C# on .NET 10 and powered by ICSharpCode.Decompiler (the engine behind ILSpy), it communicates over stdio for easy integration with Claude Code and Claude Desktop. The project is MIT licensed.&lt;/p&gt;</description></item><item><title>Projects</title><link>https://ntninja.com/projects/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://ntninja.com/projects/</guid><description>&lt;h3 class="relative group"&gt;&lt;a href="https://ntninja.com/tantoc2/" &gt;TantoC2 - Red Team Command &amp;amp; Control Framework&lt;/a&gt;
 &lt;div id="tantoc2---red-team-command--control-framework" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#tantoc2---red-team-command--control-framework" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;p&gt;A modular C2 framework for authorized penetration testing and adversary simulation. Single deployable Python process with multi-operator support, P2P relay, agentless operations, and full audit logging.&lt;/p&gt;

&lt;h3 class="relative group"&gt;&lt;a href="https://ntninja.com/wedp/" &gt;WEDP - Windows Exploit Development Plugin&lt;/a&gt;
 &lt;div id="wedp---windows-exploit-development-plugin" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#wedp---windows-exploit-development-plugin" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;p&gt;A native WinDbg extension for exploit development. Provides 20 commands for gadget search, pattern utilities, memory analysis, and more. Written in C++ with native x86/x64 support.&lt;/p&gt;</description></item><item><title>Resources</title><link>https://ntninja.com/resources/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://ntninja.com/resources/</guid><description>&lt;h1 class="relative group"&gt;Web Sites / Blogs
 &lt;div id="web-sites--blogs" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#web-sites--blogs" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h1&gt;

&lt;h3 class="relative group"&gt;Windows
 &lt;div id="windows" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#windows" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.alex-ionescu.com/" target="_blank" rel="noreferrer"&gt;Alex Ionescu&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.codemachine.com/" target="_blank" rel="noreferrer"&gt;CodeMachine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://scorpiosoftware.net/author/zodiacon/" target="_blank" rel="noreferrer"&gt;Pavel Yosifovich&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://msrc-blog.microsoft.com/" target="_blank" rel="noreferrer"&gt;Microsoft Security Response Center Blogs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.geoffchappell.com/index.htm" target="_blank" rel="noreferrer"&gt;Geoff Chappel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://devblogs.microsoft.com/oldnewthing/" target="_blank" rel="noreferrer"&gt;The Old New Thing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.osronline.com/" target="_blank" rel="noreferrer"&gt;OSR Online&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://winworldpc.com/" target="_blank" rel="noreferrer"&gt;WinWorld PC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.microsoft.com/en-us/learn/" target="_blank" rel="noreferrer"&gt;Microsoft Learn&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://syfuhs.net" target="_blank" rel="noreferrer"&gt;Steve Syfuhs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.stevestechspot.com/default.aspx" target="_blank" rel="noreferrer"&gt;Steves Tech Spot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.uninformed.org/?v=3" target="_blank" rel="noreferrer"&gt;Uninformed&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://attl4s.github.io/" target="_blank" rel="noreferrer"&gt;Attl4s&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;InfoSec
 &lt;div id="infosec" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#infosec" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.malwaretech.com/" target="_blank" rel="noreferrer"&gt;MalwareTech&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://stygiansecurity.com/" target="_blank" rel="noreferrer"&gt;Stygian Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/rmusser01/Infosec_Reference/tree/master/Draft" target="_blank" rel="noreferrer"&gt;Infosec Reference&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.securitysift.com/" target="_blank" rel="noreferrer"&gt;Security Sift&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.badsectorlabs.com/" target="_blank" rel="noreferrer"&gt;Bad Sector Labs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://ihack4falafel.github.io/" target="_blank" rel="noreferrer"&gt;I Hack 4 Falafel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cyberkhalid.github.io/" target="_blank" rel="noreferrer"&gt;Cyber Khalid&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.trailofbits.com/" target="_blank" rel="noreferrer"&gt;Trail of Bits&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fuzzysecurity.com/" target="_blank" rel="noreferrer"&gt;FuzzySecurity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.corelan.be/" target="_blank" rel="noreferrer"&gt;Corelan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://phrack.org/index.html" target="_blank" rel="noreferrer"&gt;Phrack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/" target="_blank" rel="noreferrer"&gt;DEFCON Media Server&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.exploit-db.com/papers" target="_blank" rel="noreferrer"&gt;Exploit DB Papers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhillsinfosec.com/blog/" target="_blank" rel="noreferrer"&gt;Black Hills Infosec&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ired.team/" target="_blank" rel="noreferrer"&gt;iRed.Team&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://zerodayengineering.com/research/index.html" target="_blank" rel="noreferrer"&gt;ZeroDay Engineering&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://googleprojectzero.blogspot.com/" target="_blank" rel="noreferrer"&gt;Google Project Zero&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.forrest-orr.net/blog" target="_blank" rel="noreferrer"&gt;Forrest Orr&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.vx-underground.org/windows.html" target="_blank" rel="noreferrer"&gt;VX-Underground Windows Papers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://wumb0.in/" target="_blank" rel="noreferrer"&gt;wumb0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://andreafortuna.org/" target="_blank" rel="noreferrer"&gt;Andrea Fortuna&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://0xinfection.github.io/posts/" target="_blank" rel="noreferrer"&gt;0xinfection&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.xpnsec.com/" target="_blank" rel="noreferrer"&gt;XPN (Adam Chester)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://posts.specterops.io/" target="_blank" rel="noreferrer"&gt;SpecterOps&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dirkjanm.io/" target="_blank" rel="noreferrer"&gt;Dirk-jan Mollema&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://csandker.io/" target="_blank" rel="noreferrer"&gt;0xcsandker&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.shogunlab.com/blog/" target="_blank" rel="noreferrer"&gt;Shogun Lab&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://0x00sec.org/" target="_blank" rel="noreferrer"&gt;0x00 Sec&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pre.empt.dev/" target="_blank" rel="noreferrer"&gt;PreEmpt.Dev&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://klezvirus.github.io/" target="_blank" rel="noreferrer"&gt;Klez Virus&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://book.hacktricks.xyz/welcome/readme" target="_blank" rel="noreferrer"&gt;HackTricks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://0xrick.github.io/" target="_blank" rel="noreferrer"&gt;0xRick&amp;rsquo;s Blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.back.engineering/" target="_blank" rel="noreferrer"&gt;Back Engineering Blog&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;Reverse Engineering
 &lt;div id="reverse-engineering" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#reverse-engineering" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://likeagod.revers.engineering/nt/" target="_blank" rel="noreferrer"&gt;likeagod Reverse Engineering&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/HACKE-RC/awesome-reversing" target="_blank" rel="noreferrer"&gt;Awesome Reversing&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;Programming
 &lt;div id="programming" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#programming" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://beej.us/" target="_blank" rel="noreferrer"&gt;Beej.us&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.tenouk.com/" target="_blank" rel="noreferrer"&gt;Tenouk C/C++ Notes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h1 class="relative group"&gt;Vulnerability Research / Exploit Dev / Red Teaming
 &lt;div id="vulnerability-research--exploit-dev--red-teaming" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#vulnerability-research--exploit-dev--red-teaming" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h1&gt;

&lt;h3 class="relative group"&gt;General Exploitation
 &lt;div id="general-exploitation" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#general-exploitation" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://phrack.org/issues/49/14.html" target="_blank" rel="noreferrer"&gt;Smashing the Stack for Fun and Profit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://phrack.org/issues/60/10.html" target="_blank" rel="noreferrer"&gt;Basic Integer Overflows&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.blackhat.com/us-13/US-13-Quynh-OptiROP-Hunting-for-ROP-Gadgets-in-Style-WP.pdf" target="_blank" rel="noreferrer"&gt;The Art of Hunting ROP Gadgets&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/Hack-with-Github/Awesome-Hacking" target="_blank" rel="noreferrer"&gt;Awesome Hacking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.exodusintel.com/2013/01/02/happy-new-year-analysis-of-cve-2012-4792/" target="_blank" rel="noreferrer"&gt;Analysis of CVE-2012-4792 (IE Use-After-Free)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://chompie.rip/Blog&amp;#43;Posts/Anatomy&amp;#43;of&amp;#43;an&amp;#43;Exploit&amp;#43;-&amp;#43;RCE&amp;#43;with&amp;#43;&amp;#43;SIGRed" target="_blank" rel="noreferrer"&gt;Anatomy of an Exploit - RCE with SIGRed&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.praetorian.com/blog/reproducing-proxylogon-exploit/" target="_blank" rel="noreferrer"&gt;Reproducing the ProxyLogon Exploit Chain&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;Windows
 &lt;div id="windows-1" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#windows-1" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/hatRiot/token-priv/blob/master/abusing_token_eop_1.0.txt" target="_blank" rel="noreferrer"&gt;Abusing Token Privileges for EOP&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://winbindex.m417z.com/" target="_blank" rel="noreferrer"&gt;Windows Binary Index (Old Binaries)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.trailofbits.com/2020/01/16/exploiting-the-windows-cryptoapi-vulnerability/" target="_blank" rel="noreferrer"&gt;Exploiting the Windows CryptoAPI&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References/blob/master/README.md" target="_blank" rel="noreferrer"&gt;Awesome Windows Exploitation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.codeproject.com/Articles/5304605/Creating-Shellcode-from-any-Code-Using-Visual-Stud" target="_blank" rel="noreferrer"&gt;Shellcode from Visual Studio&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/r3p3r/nixawk-awesome-windows-exploitation/blob/master/README.md" target="_blank" rel="noreferrer"&gt;NixAwk Awesome Windows Exploitation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.securitysift.com/windows-exploit-development-part-6-seh-exploits/" target="_blank" rel="noreferrer"&gt;Exploiting with SEH&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h5 class="relative group"&gt;Heap
 &lt;div id="heap" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#heap" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://illmatics.com/Windows%208%20Heap%20Internals.pdf" target="_blank" rel="noreferrer"&gt;Windows 8 Heap Internals&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://labs.bluefrostsecurity.de/blog.html/2022/08/16/windows-segment-heap-attacking-the-vs-allocator/" target="_blank" rel="noreferrer"&gt;Abusing the Windows Segment Heap&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/mgeeky/Exploit-Development-Tools?files=1" target="_blank" rel="noreferrer"&gt;Exploit Development Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/saaramar/Deterministic_LFH" target="_blank" rel="noreferrer"&gt;Deterministic LFH&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://i.blackhat.com/USA21/Wednesday-Handouts/us-21-Windows-Heap-Backed-Pool-The-Good-The-Bad-And-The-Encoded.pdf" target="_blank" rel="noreferrer"&gt;Windows Heap-Backed Pool (BlackHat USA 2021)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-16/materials/us-16-Yason-Windows-10-Segment-Heap-Internals.pdf" target="_blank" rel="noreferrer"&gt;Windows 10 Segment Heap Internals (Yason Slides)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-16/materials/us-16-Yason-Windows-10-Segment-Heap-Internals-wp.pdf" target="_blank" rel="noreferrer"&gt;Windows 10 Segment Heap Internals (Yason Whitepaper)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/presentations/bh-usa-09/MCDONALD/BHUSA09-McDonald-WindowsHeap-PAPER.pdf" target="_blank" rel="noreferrer"&gt;Windows Heap Exploitation (McDonald BH2009)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.rapid7.com/blog/post/2019/06/12/heap-overflow-exploitation-on-windows-10-explained/" target="_blank" rel="noreferrer"&gt;Heap Overflow Exploitation on Windows 10&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.c-sharpcorner.com/UploadFile/FreeBookArticles/addisonwesley/2009Aug19232329PM/Heaps/1.aspx" target="_blank" rel="noreferrer"&gt;Memory Corruption Part II - Heaps&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.corelan.be/index.php/2016/07/05/windows-10-x86wow64-userland-heap/" target="_blank" rel="noreferrer"&gt;Corelan Windows 10 x86/WoW64 Userland Heap&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://null2root-github-io.translate.goog/blog/2020/02/07/LazyFragmentationHeap-WCTF2019-writeup.html?_x_tr_sl=auto&amp;amp;_x_tr_tl=en&amp;amp;_x_tr_hl=en&amp;amp;_x_tr_pto=wapp" target="_blank" rel="noreferrer"&gt;LazyFragmentationHeap WCTF 2019 Writeup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.informit.com/articles/article.aspx?p=1081496" target="_blank" rel="noreferrer"&gt;Advanced Windows Debugging: Heaps (InformIT)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.codeguru.com/windows/inside-crt-debug-heap-management/" target="_blank" rel="noreferrer"&gt;Inside CRT: Debug Heap Management&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h5 class="relative group"&gt;Patch Diffing
 &lt;div id="patch-diffing" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#patch-diffing" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https//wumb0.in/extracting-and-diffing-ms-patches-in-2020.html" &gt;Patch Extraction and Diffing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.orangecyberdefense.com/se/blogg/cybersakerhet/introduction-to-binary-diffing-part-1" target="_blank" rel="noreferrer"&gt;Orange Defense Patch Diffing P1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.orangecyberdefense.com/se/blogg/cybersakerhet/introduction-to-binary-diffing-part-2" target="_blank" rel="noreferrer"&gt;Orange Defense Patch Diffing P2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.orangecyberdefense.com/se/blogg/cybersakerhet/introduction-to-binary-diffing-part-3" target="_blank" rel="noreferrer"&gt;Orange Defense Patch Diffing P3&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.trellix.com/en-us/assets/docs/atr-library/tr-hyper-v-automation-for-windows-patch-diffing.pdf" target="_blank" rel="noreferrer"&gt;Hyper-V Automation for Patch Diffing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://googleprojectzero.blogspot.com/2017/10/using-binary-diffing-to-discover.html" target="_blank" rel="noreferrer"&gt;Google Project Zero Patch Diffing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://ihack4falafel.github.io/Patch-Diffing-with-Ghidra/" target="_blank" rel="noreferrer"&gt;Patch Diffing with Ghidra&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.coresecurity.com/core-labs/articles/how-deal-microsoft-monthly-updates-reverse-engineering-binary-patches" target="_blank" rel="noreferrer"&gt;How to Deal with MS Monthly Updates&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/google/bindiff#documentation" target="_blank" rel="noreferrer"&gt;BinDiff&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://diffing.quarkslab.com/?ref=0xor0ne.xyz" target="_blank" rel="noreferrer"&gt;Diffing Portal (Quarkslab)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/f-bader/MSRC-PatchReview" target="_blank" rel="noreferrer"&gt;MSRC-PatchReview (PowerShell)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h5 class="relative group"&gt;Kernel
 &lt;div id="kernel" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#kernel" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.unknowncheats.me/forum/anti-cheat-bypass/334557-vulnerable-driver-megathread.html" target="_blank" rel="noreferrer"&gt;Vulnerable Driver Mega Thread&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.blackhat.com/bh-dc-11/Mandt/BlackHat_DC_2011_Mandt_kernelpool-wp.pdf" target="_blank" rel="noreferrer"&gt;Windows 7 Kernel Pool Exploitation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://sensepost.com/blog/2017/abusing-gdi-objects-for-ring0-primitives-revolution/" target="_blank" rel="noreferrer"&gt;Abusing GDI Objects for Ring0 Primitives&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://sensepost.com/blog/2017/exploiting-ms16-098-rgnobj-integer-overflow-on-windows-8.1-x64-bit-by-abusing-gdi-objects/" target="_blank" rel="noreferrer"&gt;Exploting MS16-098 Abusing GDI Objects&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=Gu_5kkErQ6Y" target="_blank" rel="noreferrer"&gt;Taking Windows 10 Exploitation to the Next Level (VIDEO)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEF%20CON%2025%20-%205A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects-WP.pdf" target="_blank" rel="noreferrer"&gt;Demystifying Kernel Exploiation by Abusing GDI Objects&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://hshrzd.wordpress.com/2017/05/28/starting-with-windows-kernel-exploitation-part-1-setting-up-the-lab/" target="_blank" rel="noreferrer"&gt;Starting with Windows Kernel Exploitation (hasherezade)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://guidedhacking.com/threads/vulnerable-kernel-drivers-for-exploitation.15979/" target="_blank" rel="noreferrer"&gt;Vulnerable Kernel Drivers for Exploitation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://j00ru.vexillium.org/2010/06/insight-into-the-driver-signature-enforcement/" target="_blank" rel="noreferrer"&gt;Driver Signature Enforcement (j00ru)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.welivesecurity.com/2022/01/11/signed-kernel-drivers-unguarded-gateway-windows-core/" target="_blank" rel="noreferrer"&gt;Signed Kernel Drivers - Unguarded Gateway (WeLiveSecurity)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://wumb0.in/windows-10-kvas-and-software-smep.html" target="_blank" rel="noreferrer"&gt;Windows 10 KVAS and Software SMEP&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h5 class="relative group"&gt;PatchGuard
 &lt;div id="patchguard" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#patchguard" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://arxiv.org/abs/2005.10884" target="_blank" rel="noreferrer"&gt;PatchGuard: A Provably Robust Defense&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://arxiv.org/abs/2104.12609" target="_blank" rel="noreferrer"&gt;PatchGuard++: Efficient Provable Attack Detection&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.hick.org/code/skape/papers/bypassing-x64-patchguard.pdf" target="_blank" rel="noreferrer"&gt;Bypassing x64 PatchGuard&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;Fuzzing
 &lt;div id="fuzzing" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#fuzzing" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/googleprojectzero/winafl" target="_blank" rel="noreferrer"&gt;WinAFL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/0vercl0k/wtf" target="_blank" rel="noreferrer"&gt;What The Fuzz&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/jtpereyda/boofuzz" target="_blank" rel="noreferrer"&gt;BooFuzz&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;Tutorials / Practice
 &lt;div id="tutorials--practice" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#tutorials--practice" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://zaratec.io/awesome-windows-ctf/" target="_blank" rel="noreferrer"&gt;Zaratec.io&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/leesh3288/WinPwn" target="_blank" rel="noreferrer"&gt;Windows PwnAble Notes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://0x00sec.org/t/getting-cozy-with-exploit-development/5311" target="_blank" rel="noreferrer"&gt;Getting Started with Exploitation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fuzzysecurity.com/tutorials.html" target="_blank" rel="noreferrer"&gt;FuzzySecurity Tutorials&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/" target="_blank" rel="noreferrer"&gt;Corelan Tutorials&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://rstforums.com/forum/topic/112984-windows-exploitation/" target="_blank" rel="noreferrer"&gt;FullShade Windows Exploitation Tutorials&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.vortex.id.au/2017/05/pwkoscp-stack-buffer-overflow-practice/" target="_blank" rel="noreferrer"&gt;PWK Buffer Overflow Practice&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.shogunlab.com/blog/2017/08/11/zdzg-windows-exploit-0.html" target="_blank" rel="noreferrer"&gt;Shogun Lab Windows Exploit Development&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pentestmag.com/course/exploit-development-windows-w38/" target="_blank" rel="noreferrer"&gt;Windows Exploit Development Class (Just Curriculum)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.thegreycorner.com/2010/12/introducing-vulnserver.html?m=1" target="_blank" rel="noreferrer"&gt;VulnServer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.vulnhub.com/" target="_blank" rel="noreferrer"&gt;VulnHub&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.hackthebox.com/" target="_blank" rel="noreferrer"&gt;HackTheBox&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://overthewire.org/wargames/" target="_blank" rel="noreferrer"&gt;OverTheWire&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://underthewire.tech/" target="_blank" rel="noreferrer"&gt;UnderTheWire&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/davidprowe/BadBlood" target="_blank" rel="noreferrer"&gt;BadBlood&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.hoppersroppers.org/roadmap/training/pwning.html" target="_blank" rel="noreferrer"&gt;Binary Exploitation Roadmap&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://guyinatuxedo.github.io/" target="_blank" rel="noreferrer"&gt;Nightmare&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.root-me.org/?lang=en" target="_blank" rel="noreferrer"&gt;Root Me&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.ctfd.io/events/challenge-levels" target="_blank" rel="noreferrer"&gt;CTFd Challenge Levels&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;VR / ED Tools
 &lt;div id="vr--ed-tools" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#vr--ed-tools" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.com/ntninja-dev/windows-exploit-development/wedp" target="_blank" rel="noreferrer"&gt;Windows Exploit Development Plugin&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/defuse/gadgetrie?files=1" target="_blank" rel="noreferrer"&gt;Gadgetrie&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/ant4g0nist/lisa.py?files=1" target="_blank" rel="noreferrer"&gt;Lisa.py&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/corelan/mona" target="_blank" rel="noreferrer"&gt;Mona.py&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.corelan.be/index.php/2011/07/14/mona-py-the-manual/" target="_blank" rel="noreferrer"&gt;Mona.py Manual&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/vxunderground/VX-API" target="_blank" rel="noreferrer"&gt;VX-Underground API&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/cobbr/PSAmsi" target="_blank" rel="noreferrer"&gt;PSAmsi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://malapi.io/" target="_blank" rel="noreferrer"&gt;MalAPI.io&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/SheLLVM/SheLLVM" target="_blank" rel="noreferrer"&gt;SheLLVM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/Martyx00/VulnFanatic" target="_blank" rel="noreferrer"&gt;VulnFanatic (Binary Ninja Plugin)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.didierstevens.com/2018/07/17/exploitable-crash-analyzer-statically-linked-crt/" target="_blank" rel="noreferrer"&gt;!exploitable Crash Analyzer&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;Red Team Tools
 &lt;div id="red-team-tools" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#red-team-tools" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;

&lt;h5 class="relative group"&gt;Scanning / Enumeration
 &lt;div id="scanning--enumeration" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#scanning--enumeration" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nmap.org/" target="_blank" rel="noreferrer"&gt;nmap&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h5 class="relative group"&gt;Windows
 &lt;div id="windows-2" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#windows-2" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/SecureAuthCorp/impacket" target="_blank" rel="noreferrer"&gt;Impacket&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/t3hbb/DefenderCheck/?s=09" target="_blank" rel="noreferrer"&gt;Defender Check&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/Karmaz95/crimson_wisp" target="_blank" rel="noreferrer"&gt;Crimson Wisp&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://ramensoftware.com/winapiexec" target="_blank" rel="noreferrer"&gt;WinAPI Exec (WinAPI through CLI)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/Hackndo/lsassy" target="_blank" rel="noreferrer"&gt;lsassy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/antonioCoco/ConPtyShell" target="_blank" rel="noreferrer"&gt;ConPtyShell&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/ly4k/SpoolFool" target="_blank" rel="noreferrer"&gt;SpoolFool&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/Hackplayers/evil-winrm" target="_blank" rel="noreferrer"&gt;Evil-WinRM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://bloodhound.readthedocs.io/en/latest/index.html" target="_blank" rel="noreferrer"&gt;BloodHound&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/gentilkiwi/mimikatz" target="_blank" rel="noreferrer"&gt;Mimikatz&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/cobbr/SharpSploit" target="_blank" rel="noreferrer"&gt;SharpSploit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/GhostPack/Seatbelt" target="_blank" rel="noreferrer"&gt;Seatbelt&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://attl4s.github.io/assets/pdf/Understanding_a_Payloads_Life.pdf" target="_blank" rel="noreferrer"&gt;Understanding a Payloads Life&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=L9SI-PZ8-j8&amp;amp;t=2s" target="_blank" rel="noreferrer"&gt;Getting Started w/ Windows Malware Dev&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h5 class="relative group"&gt;Tunneling
 &lt;div id="tunneling" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#tunneling" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/jpillora/chisel" target="_blank" rel="noreferrer"&gt;Chisel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/haad/proxychains" target="_blank" rel="noreferrer"&gt;ProxyChains&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/octeep/wireproxy" target="_blank" rel="noreferrer"&gt;WireProxy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://posts.specterops.io/get-your-socks-on-with-gtunnel-4a70a9b82b24" target="_blank" rel="noreferrer"&gt;SpectreOPS gTunnel&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h5 class="relative group"&gt;C2
 &lt;div id="c2" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#c2" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BishopFox/sliver" target="_blank" rel="noreferrer"&gt;Sliver&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/its-a-feature/Mythic" target="_blank" rel="noreferrer"&gt;Mythic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/cobbr/Covenant" target="_blank" rel="noreferrer"&gt;Covenant&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h5 class="relative group"&gt;Other
 &lt;div id="other" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#other" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/cobbr/SharpGen" target="_blank" rel="noreferrer"&gt;SharpGen&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/SnaffCon/Snaffler" target="_blank" rel="noreferrer"&gt;Snaffler&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/arthaud/git-dumper" target="_blank" rel="noreferrer"&gt;Git Dumper&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/infosecn1nja/Red-Teaming-Toolkit" target="_blank" rel="noreferrer"&gt;Red Teaming Toolkit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://exegol.readthedocs.io/en/latest/" target="_blank" rel="noreferrer"&gt;Exegol Hacking Setup&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h5 class="relative group"&gt;Evasion / AV Bypass
 &lt;div id="evasion--av-bypass" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#evasion--av-bypass" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://secret.club/2023/06/05/spoof-pe-sections.html" target="_blank" rel="noreferrer"&gt;Spoofing PE Section Headers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://ethicalchaos.dev/2020/05/27/lets-create-an-edr-and-bypass-it-part-1/" target="_blank" rel="noreferrer"&gt;Lets Create An EDR&amp;hellip; And Bypass It! Part 1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/aahmad097/AlternativeShellcodeExec" target="_blank" rel="noreferrer"&gt;Alternative Shellcode Execution Via Callbacks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://bohops.com/2023/06/09/no-alloc-no-problem-leveraging-program-entry-points-for-process-injection/" target="_blank" rel="noreferrer"&gt;Process Injection via Program Entry Points&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://medium.com/specter-ops-posts/encrypting-strings-at-compile-time-4141dafe5b41" target="_blank" rel="noreferrer"&gt;Encrypting Strings at Compile Time&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.riskinsight-wavestone.com/en/2023/10/a-universal-edr-bypass-built-in-windows-10/" target="_blank" rel="noreferrer"&gt;A Universal EDR Bypass Built in Windows 10&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;PoCs
 &lt;div id="pocs" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#pocs" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/polakow/CVE-2022-21907" target="_blank" rel="noreferrer"&gt;CVE-2022-21907 Windows HTTP.SYS DoS PoC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://showlinkroom.me/2022/04/30/Windows-CVE-2022-26809/" target="_blank" rel="noreferrer"&gt;CVE-2022-26809 MSRPC RCE (Need-Translation)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;Git Accounts
 &lt;div id="git-accounts" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#git-accounts" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/GhostPack" target="_blank" rel="noreferrer"&gt;GhostPack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/cobbr/" target="_blank" rel="noreferrer"&gt;Cobbr&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/0x43434343" target="_blank" rel="noreferrer"&gt;0x43434343&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/vxunderground" target="_blank" rel="noreferrer"&gt;VX-Underground&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/wumb0" target="_blank" rel="noreferrer"&gt;wumb0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gist.github.com/wumb0" target="_blank" rel="noreferrer"&gt;wumb0 Gists&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;Tactics, Techniques, Examples, Write-Ups
 &lt;div id="tactics-techniques-examples-write-ups" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#tactics-techniques-examples-write-ups" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://research.nccgroup.com/2021/01/23/rift-analysing-a-lazarus-shellcode-execution-method/" target="_blank" rel="noreferrer"&gt;Lazarus Shellcode Execution&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhillsinfosec.com/admins-nightmare-combining-hivenightmare-serioussam-and-ad-cs-attack-paths-for-profit/" target="_blank" rel="noreferrer"&gt;Combining HiveNightmare and SeriousSAM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.kyleavery.com/posts/avoiding-memory-scanners/" target="_blank" rel="noreferrer"&gt;Avoiding Memory Scanners&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.microsoft.com/en-us/windows/win32/taskschd/time-trigger-example--c---" target="_blank" rel="noreferrer"&gt;C++ Time Trigger Scheduled Task&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.microsoft.com/security/blog/2022/08/24/looking-for-the-sliver-lining-hunting-for-emerging-command-and-control-frameworks/" target="_blank" rel="noreferrer"&gt;MSRC Hunting for Emerging C2 Frameworks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/RedTeamOperations/Advanced-Process-Injection-Workshop" target="_blank" rel="noreferrer"&gt;Advanced Process Injection&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cybergeeks.tech/reverse-engineering-psexec-for-fun-and-knowledge/" target="_blank" rel="noreferrer"&gt;RE PsExec&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4" target="_blank" rel="noreferrer"&gt;CertiFried ADCS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.bleepingcomputer.com/news/security/microsoft-new-malware-uses-windows-bug-to-hide-scheduled-tasks/" target="_blank" rel="noreferrer"&gt;Hidden Scheduled Task&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dirkjanm.io/updating-adconnectdump-a-journey-into-dpapi/" target="_blank" rel="noreferrer"&gt;Azure ADConnectDump&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.xpnsec.com/azuread-connect-for-redteam/" target="_blank" rel="noreferrer"&gt;AzureADConnect for Red Teamers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gist.github.com/xpn/f12b145dba16c2eebdd1c6829267b90c" target="_blank" rel="noreferrer"&gt;AzureAD MSOL Dump PowerShell&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://posts.specterops.io/a-guide-to-attacking-domain-trusts-971e52cb2944" target="_blank" rel="noreferrer"&gt;Attacking Active Directory Domain Trusts&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhillsinfosec.com/phishing-made-easyish/" target="_blank" rel="noreferrer"&gt;Phishing Made Easyish&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://csandker.io/2021/01/10/Offensive-Windows-IPC-1-NamedPipes.html" target="_blank" rel="noreferrer"&gt;Offensive Windows IPC Internals&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aboutdfir.com/toolsandartifacts/windows/" target="_blank" rel="noreferrer"&gt;Windows DFIR Tools and Artifacts&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.netspi.com/blog/technical/adversary-simulation/modern-red-team-infrastructure/" target="_blank" rel="noreferrer"&gt;Modern Red Team Architecture&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://bluewantingred.com/post/powershell-empire-as-a-docker-container/" target="_blank" rel="noreferrer"&gt;Empire as a Docker Container&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://ernw.de/download/BloodHoundWorkshop/ERNW_DogWhispererHandbook.pdf" target="_blank" rel="noreferrer"&gt;The Dog Whisperers Handbook: BloodHound&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://git.culbertreport.com/posts/Ever-wondered-how-AV-knows/" target="_blank" rel="noreferrer"&gt;Ever Wondered How AV Knows&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.whiteflag.io/blog/weaponizing-windows-rpc-interfaces/" target="_blank" rel="noreferrer"&gt;Builtin Offensive Windows RPC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://mrd0x.com/stealing-tokens-from-office-applications/" target="_blank" rel="noreferrer"&gt;Stealing Access Tokens From Office Applications&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://tradecraftgarden.org/index.html" target="_blank" rel="noreferrer"&gt;A PIC Security Research Adventure&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.codeproject.com/Articles/607352/Injecting-NET-Assemblies-Into-Unmanaged-Processes" target="_blank" rel="noreferrer"&gt;Injecting .NET Assemblies Into Unmanaged Processes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://thewover.github.io/Introducing-Donut/" target="_blank" rel="noreferrer"&gt;Donut - Injecting .NET Assemblies as Shellcode&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://0xpat.github.io/Malware_development_part_9/" target="_blank" rel="noreferrer"&gt;Hosting CLR and Managed Code Injection&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://swisskyrepo.github.io/InternalAllTheThings/active-directory/ad-tricks/" target="_blank" rel="noreferrer"&gt;Active Directory Tricks (InternalAllTheThings)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h5 class="relative group"&gt;COM Hijacking
 &lt;div id="com-hijacking" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#com-hijacking" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://enigma0x3.net/2016/05/25/userland-persistence-with-scheduled-tasks-and-com-handler-hijacking/" target="_blank" rel="noreferrer"&gt;Userland Persistence w/ Scheduled Tasks and COM Handler Hijacking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/3gstudent/COM-Object-hijacking" target="_blank" rel="noreferrer"&gt;COM Object Hijacking (3gstudent)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/nccgroup/acCOMplice" target="_blank" rel="noreferrer"&gt;acCOMplice - COM Hijack Discovery and Abuse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/" target="_blank" rel="noreferrer"&gt;Abusing the COM Registry Structure Part 2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pentestlab.blog/2020/05/20/persistence-com-hijacking/" target="_blank" rel="noreferrer"&gt;Persistence - COM Hijacking&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;Cheat Sheets
 &lt;div id="cheat-sheets" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#cheat-sheets" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cheatsheetseries.owasp.org/index.html" target="_blank" rel="noreferrer"&gt;OWASP Cheat Sheet Series&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.codemachine.com/downloads/kernel_debugging_cheat_sheet.pdf" target="_blank" rel="noreferrer"&gt;Kernel Debugging Cheat Sheet&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h1 class="relative group"&gt;Windows Development / Internals
 &lt;div id="windows-development--internals" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#windows-development--internals" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-erref/1bc92ddf-b79e-413c-bbaa-99a5281a6c90" target="_blank" rel="noreferrer"&gt;Windows Error Codes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://developer.microsoft.com/en-us/windows/downloads/sdk-archive/" target="_blank" rel="noreferrer"&gt;Microsoft SDK Archive&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://winworldpc.com/product/windows-sdk-ddk/" target="_blank" rel="noreferrer"&gt;WinWorld PC Old SDKs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/Microsoft/wil" target="_blank" rel="noreferrer"&gt;Windows Implementation Library&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/microsoft/Windows-classic-samples" target="_blank" rel="noreferrer"&gt;Windows Classic Samples&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.microsoft.com/en-us/windows/win32/learnwin32/learn-to-program-for-windows" target="_blank" rel="noreferrer"&gt;Getting Started with Win32&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.microsoft.com/en-us/windows/win32/apiindex/windows-api-list" target="_blank" rel="noreferrer"&gt;Windows API List&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.microsoft.com/en-us/cpp/code-quality/using-sal-annotations-to-reduce-c-cpp-code-defects?view=msvc-170" target="_blank" rel="noreferrer"&gt;Using SAL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dotnet.microsoft.com/en-us/download/visual-studio-sdks?utm_source=getdotnetsdk&amp;amp;utm_medium=referral" target="_blank" rel="noreferrer"&gt;.NET SDKs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.conan.io/2019/09/02/Deterministic-builds-with-C-C&amp;#43;&amp;#43;.html" target="_blank" rel="noreferrer"&gt;Reproducable Builds&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nullprogram.com/blog/2021/12/30/" target="_blank" rel="noreferrer"&gt;Sanity for C/C++ Dev on Windows&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.trustedsec.com/blog/rpc-programming-for-the-aspiring-windows-developer/" target="_blank" rel="noreferrer"&gt;RPC Programming for Windows Developer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://devblogs.microsoft.com/cppblog/configure-intellisense-with-cmake-toolchain-files-in-visual-studio-2019-16-9-preview-2/" target="_blank" rel="noreferrer"&gt;Configuring IntelliSense with CMake&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://captmeelo.com/redteam/maldev/2022/05/10/ntcreateuserprocess.html" target="_blank" rel="noreferrer"&gt;Making NtCreateUserProcess Work&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://devblogs.microsoft.com/commandline/windows-command-line-backgrounder/" target="_blank" rel="noreferrer"&gt;Windows ConPTY Blog Series&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.deleaker.com/blog/2020/01/25/memory-leaks-detection-in-a-windows-service-written-in-c/" target="_blank" rel="noreferrer"&gt;Memory Leak Detection in Windows Service (Deleaker)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://devblogs.microsoft.com/cppblog/using-msvc-in-a-docker-container-for-your-c-projects/" target="_blank" rel="noreferrer"&gt;Using MSVC in a Docker Container&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://learn.microsoft.com/en-us/visualstudio/install/workload-component-id-vs-community?view=vs-2022&amp;amp;preserve-view=true" target="_blank" rel="noreferrer"&gt;VS Community Workload and Component IDs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://arstechnica.com/gadgets/2023/05/a-decade-after-it-mattered-windows-xps-activation-algorithm-is-cracked/" target="_blank" rel="noreferrer"&gt;Windows XP Activation Algorithm Cracked&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cs.fsu.edu/~zwang/files/cop4610/Fall2016/windows.pdf" target="_blank" rel="noreferrer"&gt;Windows OS Internals (FSU Lecture Notes)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;Networking
 &lt;div id="networking" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#networking" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://docs.microsoft.com/en-us/windows/win32/winsock/getting-started-with-winsock" target="_blank" rel="noreferrer"&gt;Getting Started with WinSock&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.binarytides.com/winsock-socket-programming-tutorial/" target="_blank" rel="noreferrer"&gt;WinSock Tutorial&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.winsocketdotnetworkprogramming.com/" target="_blank" rel="noreferrer"&gt;WinSock / .NET Network Programming&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.microsoft.com/en-us/windows/win32/secauthn/using-sspi-with-a-windows-sockets-server" target="_blank" rel="noreferrer"&gt;Using SSPI w/ Windows Sockets Server&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gist.github.com/odzhan/1b5836c4c8b02d4d9cb9ec574432432c" target="_blank" rel="noreferrer"&gt;SSPT TLS Client Example&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/coin8086/WinSocket" target="_blank" rel="noreferrer"&gt;WinSock SSPI/IoCompletion Examples&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;WinCrypt / Crypto Next Generation (CNG)
 &lt;div id="wincrypt--crypto-next-generation-cng" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#wincrypt--crypto-next-generation-cng" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gist.github.com/aleks-f/21d8ebf5547e17e71c92" target="_blank" rel="noreferrer"&gt;CAPI Import Public from Private PEM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.idrix.fr/Root/Samples/capi_pem.cpp" target="_blank" rel="noreferrer"&gt;CAPI PEM Import Example&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://microsoft.public.platformsdk.security.narkive.com/aOoo2o3a/client-certificate-authentication" target="_blank" rel="noreferrer"&gt;Schannel Mutual Auth&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.microsoft.com/en-us/windows/win32/secauthn/performing-authentication-using-schannel" target="_blank" rel="noreferrer"&gt;MSDN Schannel Peforming Auth&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-16/materials/us-16-Kambic-Cunning-With-CNG-Soliciting-Secrets-From-SChannel.pdf" target="_blank" rel="noreferrer"&gt;Blackhat 2016 CNG Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://learn.microsoft.com/en-us/security/sdl/cryptographic-recommendations" target="_blank" rel="noreferrer"&gt;Microsoft SDL Cryptographic Recommendations&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;WinDbg
 &lt;div id="windbg" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#windbg" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.stevestechspot.com/SOSEXV40NowAvailable.aspx" target="_blank" rel="noreferrer"&gt;SOSEX .NET WinDbg Extenstion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/bug-check-code-reference2" target="_blank" rel="noreferrer"&gt;Bug Check Code Reference&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.talosintelligence.com/2019/02/windbg-malware-analysis-with-javascript.html" target="_blank" rel="noreferrer"&gt;Talos JS in WinDbg for Malware Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/swwwolf/wdbgark" target="_blank" rel="noreferrer"&gt;WinDbg Anti-RootKit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debugger-engine-and-extension-apis" target="_blank" rel="noreferrer"&gt;Debugger Extension APIs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.microsoft.com/en-us/windows-hardware/drivers/ddi/content/dbgeng/index" target="_blank" rel="noreferrer"&gt;DbgEng Header Index&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.osr.com/nt-insider/2010-issue2/basics-debugger-extensions/" target="_blank" rel="noreferrer"&gt;OSR Basics of Debugger Extensions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/bruce30262/TWindbg" target="_blank" rel="noreferrer"&gt;TWinDbg&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 class="relative group"&gt;Internals
 &lt;div id="internals" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#internals" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.elastic.co/es/blog/introduction-to-windows-tokens-for-security-practitioners" target="_blank" rel="noreferrer"&gt;Tokens for Security Practitioners&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Cyber-Sicherheit/SiSyPHus/Workpackage4_Telemetry.pdf?__blob=publicationFile&amp;amp;v=1" target="_blank" rel="noreferrer"&gt;German OIS ETW Paper&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.microsoft.com/en-us/cpp/c-runtime-library/crt-initialization?view=msvc-170" target="_blank" rel="noreferrer"&gt;CRT Initialization&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://esec-lab.sogeti.com/posts/2016/09/12/deep-dive-wow64.html" target="_blank" rel="noreferrer"&gt;WoW64 Deep Dive (Broken?)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.exploit-db.com/docs/english/18576-deep-dive-into-os-internals-with-windbg.pdf" target="_blank" rel="noreferrer"&gt;Deep Dive into OS Internals with WinDbg&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-exploit-protection?view=o365-worldwide" target="_blank" rel="noreferrer"&gt;Defender Exploit Protections&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://threatvector.cylance.com/en_us/home/teardown-windows-10-on-arm-x86-emulation.html" target="_blank" rel="noreferrer"&gt;Windows 10 x86 Emulation on ARM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.trailofbits.com/2017/02/13/devirtualizing-c-with-binary-ninja/" target="_blank" rel="noreferrer"&gt;Devirtualizing C++ with Binary Ninja&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h4 class="relative group"&gt;Microsoft Protocol Documentation
 &lt;div id="microsoft-protocol-documentation" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#microsoft-protocol-documentation" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h4&gt;
&lt;p&gt;&lt;a href="https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-kile/e720dd17-0703-4ce4-ab66-7ccf2d72c579?source=recommendations&amp;amp;WT.mc_id=twitter" target="_blank" rel="noreferrer"&gt;Kerveberos (MS-KILE)&lt;/a&gt;&lt;/p&gt;</description></item><item><title>TantoC2 - Red Team Command &amp; Control Framework</title><link>https://ntninja.com/tantoc2/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://ntninja.com/tantoc2/</guid><description>&lt;h2 class="relative group"&gt;Links
 &lt;div id="links" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#links" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://tantoc2.ntninja.com" target="_blank" rel="noreferrer"&gt;Documentation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 class="relative group"&gt;Overview
 &lt;div id="overview" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#overview" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;TantoC2 is a red team command-and-control framework designed for authorized penetration testing and adversary simulation. It runs as a single deployable Python process with no external service dependencies — no Redis, Celery, or external databases — making deployment trivial. Built with Flask, SQLAlchemy, and SQLite, it supports concurrent multi-operator engagements with real-time WebSocket event streaming.&lt;/p&gt;</description></item><item><title>WEDP - Windows Exploit Development Plugin</title><link>https://ntninja.com/wedp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://ntninja.com/wedp/</guid><description>&lt;h2 class="relative group"&gt;Links
 &lt;div id="links" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#links" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.com/ntninja-dev/windows-exploit-development/wedp" target="_blank" rel="noreferrer"&gt;GitLab Repository&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.com/ntninja-dev/windows-exploit-development/wedp/-/releases" target="_blank" rel="noreferrer"&gt;Releases&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://ntninja.com/posts/windbg-mcp-with-wedp/" &gt;WinDBG MCP with WEDP&lt;/a&gt; — Blog post on using WEDP with an MCP server&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 class="relative group"&gt;Overview
 &lt;div id="overview" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#overview" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;WEDP is a native WinDbg extension built for exploit development workflows. Written in C++ with native x86 and x64 support, it provides 20 commands covering gadget search, pattern generation, memory analysis, and more — all from within the debugger. WEDP is MIT licensed and leverages &lt;a href="https://zydis.re/" target="_blank" rel="noreferrer"&gt;Zydis&lt;/a&gt; for disassembly and &lt;a href="https://asmjit.com/" target="_blank" rel="noreferrer"&gt;AsmJit&lt;/a&gt;/AsmTk for assembly.&lt;/p&gt;</description></item></channel></rss>