top of page


Forrest Orr
Dec 1, 202037 min read
Introduction The topic of memory corruption exploits can be a difficult one to initially break in to. When I first began to explore this...
16,602 views5 comments

Forrest Orr
Aug 4, 202023 min read
Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and...
9,898 views0 comments


Forrest Orr
Jul 16, 202019 min read
Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and...
14,207 views0 comments
bottom of page