Explore >> Select a destination


You are here

labs.bluefrostsecurity.de
| | blog.kotowicz.net
5.0 parsecs away

Travel
| | A blog on security, malware, cryptography, pentesting, javascript, php and whatnots
| | wsummerhill.github.io
6.9 parsecs away

Travel
| | For a while now, people have been using alternative callback methods in C/CSharp payloads instead of the vanilla CreateThread() or similar Windows API functions. There were several good repos on GitHub that can be used as resources to execute shellcode via Windows callback functions which were very interesting.
| | ekoparty.org
3.7 parsecs away

Travel
| | [AI summary] This article discusses indirect prompt injections and related security vulnerabilities in large language models (LLMs), highlighting real-world exploits and mitigation strategies.
| | oldboy21.github.io
17.8 parsecs away

Travel
| Hello, Hello, Aloooooooo. After some time away from coding I am here again talking about sleeping masks. Thanks to the great cybersec community there is always something to work on ?? Last time in my blog I have talked how to hide a memory mapping (where in my case a ReflectiveDLL is loaded) from memory scanners. Particularly, SLEAPING and SWAPPALA techniques are used to swap the malicious mapping with a legit Microsoft DLL at the same address, at sleeping time.