Red Teaming's Dojo
  • About Mohamed FAKROUD
  • Windows Internals
    • Playing around COM objects - PART 1
    • Digging into Windows PEB
  • Abusing IDispatch for Trapped COM Object Access & Injecting into PPL Processes
  • C++
    • Polymorphism and Virtual Function Reversal in C++
  • Shellcoding
    • Leveraging from PE parsing technique to write x86 shellcode
  • Binary Exploitation
    • Heap - House Of Force
  • Misc
    • Binary Bomb Lab :: Phase 6
  • Practical Malware Analysis Lab Write-Up
    • Analyzing Lab-06-n.exe
Powered by GitBook
On this page
  • Social Profiles
  • Certifications
  • Contact Me

About Mohamed FAKROUD

Self-taught security researcher.

Social Profiles

  • Twitter :@T3nb3w

  • Github: http[s]://github.com/T3nb3w

  • Linkedin: /in/mohamedfakroud

Certifications

  • AWS Red Team Expert (ARTE)

  • Offensive Security Web Expert (OSWE)

  • Certified Red Team Operator (CRTO)

  • Offensive Security Certified Professional (OSCP)

Contact Me

  • Email : mohamed.fakroud@gmail.com

  • Discord: T3nb3w#1918

NextPlaying around COM objects - PART 1

Last updated 18 days ago

Page cover image