Become a sponsor to Ceri Coburn
My full time role is a security consultant @PenTestPartners but in my spare time I enjoy hunting for new vulnerabilities within Windows software to improve on my reverse engineering skills. I'm also a big fan of EDR bypass methodologies and tools which you'll generally see featured within some of my projects and blog posts at https://ethicalchaos.dev/
Featured work
-
CCob/SweetPotato
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
C# 1,627 -
CCob/SharpBlock
A method of bypassing EDR's active projection DLL's by preventing entry point exection
C# 1,115 -
CCob/goreflect
Reflective DLL loading of your favorite Golang program
C 164 -
CCob/bittrex4j
Java library for accessing the Bittrex Web API's and Web Sockets
Java 32 -
CCob/SylantStrike
Simple EDR implementation to demonstrate bypass
C 160 -
CCob/gookies
A Chrome cookie dumping utility
Go 47