Home
Blacksun Hackers Club
Cancel

Cultivating An Online Persona Part 1 - Bypassing Gmail's Phone Verification

Foreword Cultivating an online persona in the modern era of the internet can be difficult without giving up too much of your own personal information due to the rise of spammers leveraging bots to ...

Leveraging Application Verifier for Function Hooking and Persistence

Introduction to Application Verifier Function hooking is a powerful tool for attackers. The ability to inspect and modify data structures as they’re passed between functions within a program gives ...

Post Exploitation Persistence With Application Shims (Intro)

About Application Shims As new versions of Windows get released, and system APIs get updated, older applications develop problems. Some wont install/run because theyre only coded to check for compa...

Kernel Defenses, Detection, and Exploitation

Intro: Nothing Good Lasts Forever As mainstream shifts their attention towards the kernel landscape its sponsored defenses have made their way into our everyday hardware and officially supported ke...