Tedi Heriyanto
Blogs, Articles, and Posts
Exploring PowerShell Reflective Loading in Lumma Stealer
(medium.com)
One of the most common techniques I've seen used by threat actors to deliver Lumma Stealer payloads
By: Tedi Heriyanto submitted:Jan 31 2025
One of the most common techniques I've seen used by threat actors to deliver Lumma Stealer payloads
to victims is Reflective Loading, leveraging the .NET library. Reflective Loading is a technique...
By: Tedi Heriyanto submitted:Jan 31 2025
How to Run Atomic Red Team on Linux and Automate Attack Simulations with Velociraptor
(socfortress.medium.com)
Atomic Red Team is an outstanding framework for simulating real-world adversary behaviors. While
By: Tedi Heriyanto submitted:Jul 18 2025
Atomic Red Team is an outstanding framework for simulating real-world adversary behaviors. While
many security professionals focus on Windows endpoints, it's equally crucial to validate detection.
By: Tedi Heriyanto submitted:Jul 18 2025
