Explore >> Select a destination


You are here

www.codeproject.com
| | wsummerhill.github.io
3.2 parsecs away

Travel
| | Malware Development Introduction (aka Malware Dev 101), Part 1
| | pentestlaboratories.com
3.0 parsecs away

Travel
| | Microsoft .NET framework is being heavily utilized by threat actors and red teams for defense evasion and staying off the radar during operations. Every .NET binary contains application domains where assemblies are loaded in a safe manner. The AppDomainManager object can be used to create new ApplicationDomains inside a .NET process. From the perspective of...
| | blog.ropnop.com
1.4 parsecs away

Travel
| | Write up of my journey figuring out how to host the CLR and execute .NET assemblies from memory in pure Go.
| | gpfault.net
17.2 parsecs away

Travel
| [AI summary] The text provides an in-depth exploration of various x86-64 instruction set architectures, focusing on arithmetic operations (ADD, SUB, MUL, SMUL, DIV, SDIV), logical operations (AND, OR, XOR, NOT), and control flow instructions. It details the implementation of these instructions in the QBX virtual machine, emphasizing how they emulate real x86-64 instructions while managing the flags register and handling different operand sizes (8-bit and 16-bit). The text also discusses the nuances of flag handling, register operations, and macro-based code generation to streamline instruction implementation.