6:56LKM Rootkit Singularity vs eBPF security tools - Sophisticated Linux MalwareMatheuZ Security1.3K views·2 months ago
1:33Finding Hidden LKM Rootkits and making visible with ModTracerMatheuZ Security845 views·1 year ago
0:47Linux Kernel-Mode rootkits detecting hooked syscalls with Tracee.MatheuZ Security481 views·2 years ago
1:03Bypassing Sophos Endpoint Protection + Havoc C2 Defense EvasionMatheuZ Security745 views·2 years ago
3:11EASY Bypass rkhunter detection (rootkit hunter) with D3m0n1z3dShellMatheuZ Security634 views·2 years ago
1:08APT-38 Phishing Technical using Visual Studio Hacking the HackerMatheuZ Security982 views·2 years ago
1:08Bypass Windows Defender Using AMSI - Defense Evasion + Cobalt StrikeMatheuZ Security2.6K views·2 years ago
1:11Linux Intercept Syscall write with LKM ( Loadable Kernel Module )MatheuZ Security700 views·2 years ago
1:51[DEMO] Rootkit Anti-Reversing Technique Overwrite Section Header with Null BytesMatheuZ Security829 views·2 years ago
8:40Grafana Arbitrary File Read, MySQL exposed & Consul Service - Ambassador HackTheBoxMatheuZ Security720 views·3 years ago
4:17Misconfiguration, ROP - Máquina Easy CTF Universidade HackerMatheuZ Security661 views·3 years ago
45:39PHP Insecure Deser, LFI2RCE, Docker Escape - Máquina Hard CTF Universidade HackerMatheuZ Security824 views·3 years ago