<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://psyrun.github.io/</id><title>Psyrun</title><subtitle>psyrun's blog about malware analysis and other security topics</subtitle> <updated>2024-07-04T11:02:48+00:00</updated> <author> <name>Psyrun</name> <uri>https://psyrun.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://psyrun.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://psyrun.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator> <rights> © 2024 Psyrun </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Windows Process Free Memory and Privelege Enumeration</title><link href="https://psyrun.github.io/process-privelege-enumeration/" rel="alternate" type="text/html" title="Windows Process Free Memory and Privelege Enumeration" /><published>2024-06-20T00:00:00+00:00</published> <updated>2024-06-20T00:00:00+00:00</updated> <id>https://psyrun.github.io/process-privelege-enumeration/</id> <content src="https://psyrun.github.io/process-privelege-enumeration/" /> <author> <name>Psyrun</name> </author> <category term="Windows-Vulnerability-Research" /> <summary> Exploring Free Memory Regions in Windows Processes When analyzing software vulnerabilities, it’s crucial to understand the memory layout of a process. One aspect of this is identifying free memory regions, which can be exploited by attackers to execute arbitrary code. In this blog post, we’ll explore a program written in C that lists all processes running on a Windows system and identifies the... </summary> </entry> <entry><title>Enumerating Running Processes in Windows for Vulnerability Research</title><link href="https://psyrun.github.io/process-enumeration/" rel="alternate" type="text/html" title="Enumerating Running Processes in Windows for Vulnerability Research" /><published>2024-06-19T00:00:00+00:00</published> <updated>2024-06-20T05:40:42+00:00</updated> <id>https://psyrun.github.io/process-enumeration/</id> <content src="https://psyrun.github.io/process-enumeration/" /> <author> <name>Psyrun</name> </author> <category term="Windows-Vulnerability-Research" /> <summary> Introduction This blog discusses a simple C program for enumerating running processes in Windows using the Windows API and explains its relevance in vulnerability research. The program provides a foundation for analyzing running processes, which is crucial in identifying potential vulnerabilities in software and system configurations. Program Overview The program uses the Windows API functions... </summary> </entry> <entry><title>Reverse Shell in Go</title><link href="https://psyrun.github.io/go-revshell/" rel="alternate" type="text/html" title="Reverse Shell in Go" /><published>2024-06-19T00:00:00+00:00</published> <updated>2024-06-20T05:42:52+00:00</updated> <id>https://psyrun.github.io/go-revshell/</id> <content src="https://psyrun.github.io/go-revshell/" /> <author> <name>Psyrun</name> </author> <category term="Windows-Reverse-Shell" /> <summary> Building a Reverse Shell in Go In this tutorial, we’ll explore how to create a basic reverse shell in Go. A reverse shell is a type of shell where the target machine communicates back to the attacking machine. This can be useful for remote administration or accessing a system that is behind a firewall. Understanding the Code Let’s break down the code step by step: ### Package and Imports p... </summary> </entry> <entry><title>Recon with psymap-nmap.py</title><link href="https://psyrun.github.io/Recon-with-nmap/" rel="alternate" type="text/html" title="Recon with psymap-nmap.py" /><published>2024-06-18T00:00:00+00:00</published> <updated>2024-06-20T05:45:48+00:00</updated> <id>https://psyrun.github.io/Recon-with-nmap/</id> <content src="https://psyrun.github.io/Recon-with-nmap/" /> <author> <name>Psyrun</name> </author> <category term="Reconnaissance" /> <summary> Understanding Nmap Commands for Network Scanning Nmap (Network Mapper) is a powerful open-source tool used for network exploration and security auditing. It works by sending packets to target hosts and analyzing the responses to determine various aspects of the network, such as open ports, operating systems, and services running on the hosts. In this blog post, we will explore various Nmap co... </summary> </entry> </feed>
