🔧 Minecraft Mod & Plugin Developer
💜 Kotlin Lover
👀 How to reach me?
- DM me on Discord: qurti.dll
- Or mail me: QurtiDev@proton.me
🦈 Currently: Diving deep into Red Teaming, Pentesting, and CTFs
🎯Mainly focusing on:
• Malware Analysis & Reverse Engineering
• Custom Tool & Software Development
• Red Team Planning & Strategy
• Windows AD & Azure Attacks
• Linux Exploitation
• Web Exploitation Techniques
🔓 TryHackMe:
"The payload knows where it is at all times. It knows this because it knows where it isn't. By subtracting where it is from where it isn't, or where it was - if it isn't there, it obtains a deviation, or error in source data.
By having source data of deviation, the payload can then predict where it isn't going to be 100-400ms (Depending on network latency) from now. Without this data, the payload would simply be a blob of shellcode blindly spraying ROP chains into kernel space forever.
The payload knows this because the beacon operator told it. The operator knows because he read the MITRE ATT&CK matrix. Any deviation within acceptable bounds of EDR & AV evasion must be corrected before execution."


