|
You are here |
fluxsec.red | ||
| | | | |
goggleheadedhacker.com
|
|
| | | | | This article presents writeups for three of the reverse engineering challenges from the HacktheBox University CTF. | |
| | | | |
intezer.com
|
|
| | | | | Reverse engineering is an integral part of malware analysis and research - get started learning this advanced skill to investigate malware. | |
| | | | |
antonioparata.blogspot.com
|
|
| | | | | I created this post as part of my jouring in getting more acquainted with the Intel architecture. Segmentation is a very important top... | |
| | | | |
pentestlaboratories.com
|
|
| | | Microsoft .NET framework is being heavily utilized by threat actors and red teams for defense evasion and staying off the radar during operations. Every .NET binary contains application domains where assemblies are loaded in a safe manner. The AppDomainManager object can be used to create new ApplicationDomains inside a .NET process. From the perspective of... | ||