You are here |
modexp.wordpress.com | ||
| | | |
scorpiosoftware.net
|
|
| | | | Many developers and researcher are faimilar with the SetWindowsHookEx API that provides ways to intercept certain operations related to user interface, such as messages targetting windows. Most of these hooks can be set on a specific thread, or all threads attached to the current desktop. A short video showing how to use this API can... | |
| | | |
malwaretech.com
|
|
| | | | Evading user mode EDR hooks by hijacking the AppVerifier layer | |
| | | |
xorl.wordpress.com
|
|
| | | | I was reverse engineering a fileless (meaning the malicious payload is only in the system's memory) malware sample and I came across this technique which apparently is quite popular in fileless malware. So, this is what this post will be about. How fileless malware take advantage of PEB (Process Environment Block) enumeration to work. You... | |
| | | |
conoroneill.net
|
|
| | Mixed laterality since 1968 |