This is my writeup for Stonks, a Binary Exploitation puzzle put out for picoCTF 2021. This, along with many other Binary Exploitation puzzles are available at play.picoctf.org. Stonks was not worth a lot of points compared to other challenges, so I figured it would be easy. Comparatively, the highest scoring puzzle in the Binary Exploitation …
Finding Processes With Suspicious CWD Using procfs
Find malware running from temporary directories using procfs.

Finding Masquerading Processes With procfs
Find masquerading processes using procfs.
Using procfs For Forensics and Incident Response
Using procfs For Forensics and Incident Response.
Installing evil-winrm on Ubuntu 20.04
Install evil-winrm on Ubuntu 20.04
Toggling Chrome Safe Browsing
Toggle Safe Browsing in Google Chrome.
CTF Triage Data Acquisition
A quick overview of triage data acquisition in the context of attack/defend CTFs.
Post-Exploitation With gawk
Some post exploitation techniques using gawk.
Accessing Alternate Data Streams on VMDK Images on Linux
Accessing Alternate Data Streams on VMDK Images on Linux.

REVIEW:Malware Data Science – Attack Detection and Attribution
Review of Malware Data Science: Attack Detection and Attribution

REVIEW: RED TEAM Operator: Windows Persistence Course by SEKTOR7 Institute
My review of SEKTOR7 Institute's Red Team Operator, Windows Persistence course.
git: You can’t push to git://…
Configure a git repository's origin as SSH rather than HTTPS.