<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>pre.empt.blog</title>
    <link>https://pre.empt.blog/</link>
    <description>Offensive security research from pre.empt — red-team work, malware development, evasion, and Windows internals, written long-form.</description>
    <language>en</language>
    <lastBuildDate>Wed, 20 May 2026 20:50:36 +0000</lastBuildDate>
    <atom:link href="https://pre.empt.blog/rss.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Static Data Exploration of Malware and Goodware Samples</title>
      <link>https://pre.empt.blog/posts/static-data-exploration/</link>
      <guid>https://pre.empt.blog/posts/static-data-exploration/</guid>
      <pubDate>Mon, 16 Jun 2025 00:00:00 +0000</pubDate>
      <dc:creator>Brandon McGrath, Michael Ranaldo</dc:creator>
      <description>Exploring our dataset of malware and benign binaries to find patterns, anomalies, and generally seeing what we have.</description>
    </item>
    <item>
      <title>Maelstrom #6: Working with AMSI and ETW for Red and Blue</title>
      <link>https://pre.empt.blog/posts/maelstrom-6/</link>
      <guid>https://pre.empt.blog/posts/maelstrom-6/</guid>
      <pubDate>Thu, 18 Aug 2022 00:00:00 +0000</pubDate>
      <dc:creator>Brandon McGrath, Michael Ranaldo</dc:creator>
      <description>Endpoint Protection and Response is complicated for both offence and defence. In this blog we take a look at AMSI and ETW from both perspectives.</description>
    </item>
    <item>
      <title>Maelstrom #7: Static OpSec Review</title>
      <link>https://pre.empt.blog/posts/maelstrom-7/</link>
      <guid>https://pre.empt.blog/posts/maelstrom-7/</guid>
      <pubDate>Thu, 18 Aug 2022 00:00:00 +0000</pubDate>
      <dc:creator>Brandon McGrath, Michael Ranaldo</dc:creator>
      <description>Breaking down the Maelstrom DLL and Loader to identify and discuss remediations for indicators-of-compromise.</description>
    </item>
    <item>
      <title>Maelstrom #3: Building the Team Server</title>
      <link>https://pre.empt.blog/posts/maelstrom-3/</link>
      <guid>https://pre.empt.blog/posts/maelstrom-3/</guid>
      <pubDate>Mon, 11 Jul 2022 00:00:00 +0000</pubDate>
      <dc:creator>Brandon McGrath, Michael Ranaldo</dc:creator>
      <description>Exploring the development of a C2 Team Server, discussing common challenges, stealth techniques, and the complexities of identifying malicious network traffic.</description>
    </item>
    <item>
      <title>Maelstrom #5: EDR Kernel Callbacks, Hooks, and Call Stacks</title>
      <link>https://pre.empt.blog/posts/maelstrom-5/</link>
      <guid>https://pre.empt.blog/posts/maelstrom-5/</guid>
      <pubDate>Mon, 11 Jul 2022 00:00:00 +0000</pubDate>
      <dc:creator>Brandon McGrath, Michael Ranaldo</dc:creator>
      <description>Endpoint Protection and Response is complicated for both offence and defence. In this blog we take a look at Kernel Callbacks, Hooks, and Thread Call Stacks from both perspectives.</description>
    </item>
    <item>
      <title>Maelstrom #4: Writing a C2 Implant</title>
      <link>https://pre.empt.blog/posts/maelstrom-4/</link>
      <guid>https://pre.empt.blog/posts/maelstrom-4/</guid>
      <pubDate>Mon, 11 Jul 2022 00:00:00 +0000</pubDate>
      <dc:creator>Brandon McGrath, Michael Ranaldo</dc:creator>
      <description>In this blog, we will discuss how to write a C2 implant for the modern era. We will look at the history of offensive techniques and the progress of defence.</description>
    </item>
    <item>
      <title>Maelstrom #2: The C2 Architecture</title>
      <link>https://pre.empt.blog/posts/maelstrom-2/</link>
      <guid>https://pre.empt.blog/posts/maelstrom-2/</guid>
      <pubDate>Mon, 13 Jun 2022 00:00:00 +0000</pubDate>
      <dc:creator>Brandon McGrath, Michael Ranaldo</dc:creator>
      <description>A look into the design choices behind the C2, along side some design concepts to keep it stable, and the workflow smooth.</description>
    </item>
    <item>
      <title>Bluffy the AV Slayer: Bypassing Static Detection</title>
      <link>https://pre.empt.blog/posts/bluffy/</link>
      <guid>https://pre.empt.blog/posts/bluffy/</guid>
      <pubDate>Mon, 13 Jun 2022 00:00:00 +0000</pubDate>
      <dc:creator>Brandon McGrath, Michael Ranaldo</dc:creator>
      <description>Playing with AV evasion techniques by using formats such as CSS, SVG, etc.</description>
    </item>
    <item>
      <title>Maelstrom #1: An Introduction</title>
      <link>https://pre.empt.blog/posts/maelstrom-1/</link>
      <guid>https://pre.empt.blog/posts/maelstrom-1/</guid>
      <pubDate>Mon, 13 Jun 2022 00:00:00 +0000</pubDate>
      <dc:creator>Brandon McGrath, Michael Ranaldo</dc:creator>
      <description>Throughout this series, we will be slowly building out a Command &amp; Control Framework and discussing common implementation, IOCs, and TTPs.</description>
    </item>
  </channel>
</rss>
