image

EthicalHackers

Pentester et hacker indépendant pour les sociétés

  • Accueil
  • Services
  • CV
  • Blog
  • Contact
Télécharger mon CV
Pentester et auditeur en sécurité informatique
EthicalHackers

Blog

Tool development
EDR evasion through transpilation and virtualization
27 Août 2025

EDR evasion through transpilation and virtualization

Exploitation
A phantom has been haunting me: a deep dive into SMBGhost (part 1)
04 Mai 2023

A phantom has been haunting me: a deep dive into SMBGhost (part 1)

Exploitation
Ressource Based Constrained Delegation abuse through GenericWrite
19 Jan 2022

Ressource Based Constrained Delegation abuse through GenericWrite

Exploitation
One IPv6 packet to compromise your whole infrastructure
04 Jan 2022

One IPv6 packet to compromise your whole infrastructure

Exploitation
How to be a good pentester: have a scalable and maintainable practice environment (Part 2)
04 Jan 2022

How to be a good pentester: have a scalable and maintainable practice environment (Part 2)

Tool development
Finally some progress with Orbital: A tool to assess your payloads stealthiness
04 Oct 2021

Finally some progress with Orbital: A tool to assess your payloads stealthiness

See All Posts

Articles récents

  • EDR evasion through transpilation and virtualization
  • A phantom has been haunting me: a deep dive into SMBGhost (part 1)
  • Ressource Based Constrained Delegation abuse through GenericWrite
  • One IPv6 packet to compromise your whole infrastructure
  • How to be a good pentester: have a scalable and maintainable practice environment (Part 2)

Commentaires récents

  • hgou dans How to be a good pentester: have a scalable and maintainable practice environment (Part 1)