|
You are here |
alice.climent-pommeret.red | ||
| | | | |
bohops.com
|
|
| | | | | Introduction Process Injection is a popular technique used by Red Teams and threat actors for defense evasion, privilege escalation, and other interesting use cases. At the time of this publishing, MITRE ATT&CK includes 12 (remote) process injection sub-techniques. Of course, there are numerous other examples as well as various and sundry derivatives. Recently, I was... | |
| | | | |
oldboy21.github.io
|
|
| | | | | Reflective DLL After some time spent on implementing a Reflective DLL and its beloved Loader/Injector I thought that it could have been a very great first topic for what it might become a long-ish series of blog posts about security, but mostly struggles and C(++). First reason is that I felt like I was struggling a bit finding resources that would really take the topic as a whole and explain any single step, and the reasoning behind it. | |
| | | | |
mdanilor.github.io
|
|
| | | | | A beginers guide into a Windows kernel stack overflow vulnerability from zero to advanced bypasses. | |
| | | | |
www.tyil.nl
|
|
| | | [AI summary] This blog post provides a step-by-step tutorial on configuring nginx with Let's Encrypt SSL on a FreeBSD server to secure a static website. | ||