Explore >> Select a destination


You are here

wsummerhill.github.io
| | goggleheadedhacker.com
3.1 parsecs away

Travel
| | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application.
| | cocomelonc.github.io
1.5 parsecs away

Travel
| |
| | thewover.github.io
4.0 parsecs away

Travel
| | TLDR: Presenting DInvoke, a new API in SharpSploit that acts as a dynamic replacement for PInvoke. Using it, we show how to dynamically invoke unmanaged code from memory or disk while avoiding API Hooking and suspicious imports.
| | www.huntress.com
23.9 parsecs away

Travel
| Cybersecurity is dynamic and ever-changing. Learn more about the fundamentals of cybersecurity with Huntress.