|
You are here |
asymptotic.io | ||
| | | | |
arunraghavan.net
|
|
| | | | | ||
| | | | |
www.daily.co
|
|
| | | | | Learn how live streaming and recording work at Daily, as well as how we made key architecture decisions. | |
| | | | |
sanchayanmaity.net
|
|
| | | | | ||
| | | | |
oldboy21.github.io
|
|
| | | Hello, Hello, Aloooooooo. After some time away from coding I am here again talking about sleeping masks. Thanks to the great cybersec community there is always something to work on ?? Last time in my blog I have talked how to hide a memory mapping (where in my case a ReflectiveDLL is loaded) from memory scanners. Particularly, SLEAPING and SWAPPALA techniques are used to swap the malicious mapping with a legit Microsoft DLL at the same address, at sleeping time. | ||