// Blog

Red team tricks, AD exploitation writeups, malware development, and offensive security research.

Exploiting Active Directory Trust Relationships Across Forests
A deep dive into abusing trust relationships between Active Directory forests for lateral movement. Covering SID filtering bypass, cross-forest Kerberoasting, and leveraging trust keys for golden ticket attacks.
→ READ MORE
Android SSL Pinning Bypass — Complete Troubleshooting Guide
Complete guide to bypassing SSL pinning on Android apps during penetration testing. Covers Frida, Objection, apk-mitm, manual patching, and troubleshooting common errors.
→ READ MORE
Bypassing Android Forced Update Dialogs with Frida
How to bypass forced update dialogs that block access to Android applications during mobile penetration testing. Covers 5 methods: Dialog hooking, version spoofing, network blocking, and APK patching.
→ READ MORE
Bypassing EDR Solutions: Techniques from the Field
Real-world techniques for evading modern EDR solutions including Sophos, CrowdStrike, and Defender for Endpoint. Covering process injection, API unhooking, ETW patching, and encrypted payload delivery.
→ READ MORE