|
You are here |
www.codeproject.com | ||
| | | | |
wsummerhill.github.io
|
|
| | | | | Malware Development Introduction (aka Malware Dev 101), Part 1 | |
| | | | |
blog.ropnop.com
|
|
| | | | | Write up of my journey figuring out how to host the CLR and execute .NET assemblies from memory in pure Go. | |
| | | | |
pentestlaboratories.com
|
|
| | | | | Microsoft .NET framework is being heavily utilized by threat actors and red teams for defense evasion and staying off the radar during operations. Every .NET binary contains application domains where assemblies are loaded in a safe manner. The AppDomainManager object can be used to create new ApplicationDomains inside a .NET process. From the perspective of... | |
| | | | |
github.com
|
|
| | | GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects. | ||