<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://nirajkharel.com.np/</id><title>Niraj Kharel</title><subtitle>Vulnerability Assessment, Penetration Testing, HackTheBox, HTB.</subtitle> <updated>2026-01-24T13:11:12+05:45</updated> <author> <name>Niraj Kharel</name> <uri>https://nirajkharel.com.np/</uri> </author><link rel="self" type="application/atom+xml" href="https://nirajkharel.com.np/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://nirajkharel.com.np/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 Niraj Kharel </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Threat Hunting Basics</title><link href="https://nirajkharel.com.np/posts/threat-hunting-basics/" rel="alternate" type="text/html" title="Threat Hunting Basics" /><published>2026-01-17T11:55:00+05:45</published> <updated>2026-01-17T11:55:00+05:45</updated> <id>https://nirajkharel.com.np/posts/threat-hunting-basics/</id> <content src="https://nirajkharel.com.np/posts/threat-hunting-basics/" /> <author> <name>nirajkharel</name> </author> <category term="Red Teaming" /> <category term="Threat Hunting" /> <summary> Threat Hunting Basics Threat hunting is the proactive practice of searching for hidden threats or malicious activity within an organization’s environment, before or sometimes after alerts are triggered. Its main goal is to uncover attacks early, reducing the dwell time, which is the period an adversary remains undetected in the network. Dwell time refers to the period an attacker remains undet... </summary> </entry> <entry><title>Offensive C - QueueUserAPC (Early Bird APC Injection)</title><link href="https://nirajkharel.com.np/posts/queueuserpac-early-bird-apc-injection/" rel="alternate" type="text/html" title="Offensive C - QueueUserAPC (Early Bird APC Injection)" /><published>2025-06-21T11:55:00+05:45</published> <updated>2025-06-21T11:55:00+05:45</updated> <id>https://nirajkharel.com.np/posts/queueuserpac-early-bird-apc-injection/</id> <content src="https://nirajkharel.com.np/posts/queueuserpac-early-bird-apc-injection/" /> <author> <name>nirajkharel</name> </author> <category term="Red Teaming" /> <category term="Offensive Programming" /> <summary> I have already discussed about Early Bird APC Injection using QueueUserAPC method on this blog. On a high level, with respect to the old method, we start by creating a suspended process example Notepad.exe, which pauses its execution. This lets us get a handle to the process and its threads. We then allocate memory using VirtualAlloc and inject our shellcode with WriteProcessMemory. Instead of ... </summary> </entry> <entry><title>Offensive C - Shellcode Encryption and Staging</title><link href="https://nirajkharel.com.np/posts/payload-encryption-staging/" rel="alternate" type="text/html" title="Offensive C - Shellcode Encryption and Staging" /><published>2025-06-01T11:55:00+05:45</published> <updated>2025-06-01T11:55:00+05:45</updated> <id>https://nirajkharel.com.np/posts/payload-encryption-staging/</id> <content src="https://nirajkharel.com.np/posts/payload-encryption-staging/" /> <author> <name>nirajkharel</name> </author> <category term="Red Teaming" /> <category term="Offensive Programming" /> <summary> In the previous blog, we discussed how to get around Windows Defender by using payload obfuscation. This time, we’ll go over how to get the beacon into our sliver C2 undetected by using shellcode staging together with shellcode encryption. As background, we will listen for a connection on the C2 server, use msfvenom to build a shellcode, use hellshell to encrypt the shellcode using AES, and t... </summary> </entry> <entry><title>Offensive C - Shellcode Obfuscation</title><link href="https://nirajkharel.com.np/posts/payload-encryption-and-obfuscation/" rel="alternate" type="text/html" title="Offensive C - Shellcode Obfuscation" /><published>2025-05-24T11:55:00+05:45</published> <updated>2025-05-24T11:55:00+05:45</updated> <id>https://nirajkharel.com.np/posts/payload-encryption-and-obfuscation/</id> <content src="https://nirajkharel.com.np/posts/payload-encryption-and-obfuscation/" /> <author> <name>nirajkharel</name> </author> <category term="Red Teaming" /> <category term="Offensive Programming" /> <summary> Shellcode We have already discussed about process injection using shellcode which pretty much explains about why and how to use it. Giving the background again, shellcode is just a collection of instructions within the Windows system which executes the command in order to take control or generate a reverse shell connection to an attacker’s machine. Below is a simple example of generating a Win... </summary> </entry> <entry><title>One Approach towards Android Bug Bounty</title><link href="https://nirajkharel.com.np/posts/android-bug-bounty/" rel="alternate" type="text/html" title="One Approach towards Android Bug Bounty" /><published>2025-01-05T11:55:00+05:45</published> <updated>2025-01-05T11:55:00+05:45</updated> <id>https://nirajkharel.com.np/posts/android-bug-bounty/</id> <content src="https://nirajkharel.com.np/posts/android-bug-bounty/" /> <author> <name>nirajkharel</name> </author> <category term="Mobile Pentesting" /> <category term="Android" /> <summary> Last month, I discovered a couple of issues related to Exported Activities and Intent Injections. These vulnerabilities were either unreported or reported in a manner that underestimated their impact, often categorising them as low severity or informational. In this blog, I aim to share insights into one of the methods for identifying such issues and strategies to escalate their impact to High... </summary> </entry> </feed>
