|
You are here |
alice.climent-pommeret.red | ||
| | | | |
mdanilor.github.io
|
|
| | | | | A beginers guide into a Windows kernel stack overflow vulnerability from zero to advanced bypasses. | |
| | | | |
cocomelonc.github.io
|
|
| | | | | [AI summary] An author demonstrates a custom C++ implementation of WinAPI GetProcAddress using the Windows PEB to bypass antivirus detection in malware analysis. | |
| | | | |
bohops.com
|
|
| | | | | Introduction Process Injection is a popular technique used by Red Teams and threat actors for defense evasion, privilege escalation, and other interesting use cases. At the time of this publishing, MITRE ATT&CK includes 12 (remote) process injection sub-techniques. Of course, there are numerous other examples as well as various and sundry derivatives. Recently, I was... | |
| | | | |
github.community
|
|
| | | Ask questions, get answers, share expertise. | ||