From d2a8ec9a5a6fdccd8e74fdc038a2dcd88ee5d48a Mon Sep 17 00:00:00 2001 From: ae Date: Sat, 7 Jun 2025 22:10:02 +0300 Subject: [PATCH] fix: typo in old post --- content/posts/understanding-srdi.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/posts/understanding-srdi.md b/content/posts/understanding-srdi.md index aafc284..cecd630 100644 --- a/content/posts/understanding-srdi.md +++ b/content/posts/understanding-srdi.md @@ -646,7 +646,7 @@ As hinted in the previous sections, the loader utilizes a few trivial obfuscatio If we take a look at the whole [repository](https://git.umbrella.haus/ae/airborne), we can identify the PoC injector (utilizing plain `CreateRemoteThread`) as quite apparent weak link in the chain. Projects like [BypassAV by matro7sh](https://github.com/matro7sh/BypassAV) display a variety of a lot better techniques, if one is interested in improving in that area: -![Map of essentail AV/EDR bypass methods](/images/understanding-srdi/bypass-av.png) +![Map of essential AV/EDR bypass methods](/images/understanding-srdi/bypass-av.png) ## References