|
You are here |
www.politoinc.com | ||
| | | | |
wsummerhill.github.io
|
|
| | | | | Malware Development Introduction (aka Malware Dev 101), Part 1 | |
| | | | |
cocomelonc.github.io
|
|
| | | | | [AI summary] A technical tutorial explaining how to implement API hooking on Windows using C and DLLs to intercept and modify function calls. | |
| | | | |
openpunk.com
|
|
| | | | | Recently I faced a rather intimidating problem while working on a project. The problem was fairly simple from an objective point of view: "How do I load a DLL into a process on startup?" Now you might be wondering, "Why not just patch the IAT (import address table) on the executable and force it to load your payload DLL??" Yes! That was my exact thoughts too, however for reasons I'll explain it wasn't that simple. | |
| | | | |
github.com
|
|
| | | Contribute to riktw/LitexTang9KExperiments development by creating an account on GitHub. | ||