Forrest OrrAug 4, 202023 min readMasking Malicious Memory Artifacts – Part III: Bypassing Defensive ScannersIntroduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and...
Forrest OrrOct 2, 201914 min readMasking Malicious Memory Artifacts – Part I: Phantom DLL HollowingIntroduction I've written this article with the intention of improving the skill of the reader as relating to the topic of memory stealth...