Explore >> Select a destination


You are here

modexp.wordpress.com
| | scorpiosoftware.net
90.9 parsecs away

Travel
| | Many developers and researcher are faimilar with the SetWindowsHookEx API that provides ways to intercept certain operations related to user interface, such as messages targetting windows. Most of these hooks can be set on a specific thread, or all threads attached to the current desktop. A short video showing how to use this API can...
| | malwaretech.com
125.0 parsecs away

Travel
| | Evading user mode EDR hooks by hijacking the AppVerifier layer
| | xorl.wordpress.com
62.5 parsecs away

Travel
| | I was reverse engineering a fileless (meaning the malicious payload is only in the system's memory) malware sample and I came across this technique which apparently is quite popular in fileless malware. So, this is what this post will be about. How fileless malware take advantage of PEB (Process Environment Block) enumeration to work. You...
| | conoroneill.net
170.2 parsecs away

Travel
| Mixed laterality since 1968