Explore >> Select a destination


You are here

theevilbit.github.io
| | mdanilor.github.io
5.1 parsecs away

Travel
| | A beginers guide into a Windows kernel stack overflow vulnerability from zero to advanced bypasses.
| | scorpiosoftware.net
5.2 parsecs away

Travel
| | Windows provides much of its functionality via kernel objects. Common examples are processes, threads, mutexes, semaphores, sections, and many more. We can see the object types supported on a particular Windows system by using a tool such as Object Explorer, or in a more limited way - WinObj. Here is a view from Object Explorer:...
| | modexp.wordpress.com
4.9 parsecs away

Travel
| | Introduction Quick post about Windows System calls that I forgot about working on after the release of Dumpert by Cn33liz last year, which is described in this post. Typically, EDR and AV set hooks on Win32 API or NT wrapper functions to detect and mitigate against malicious activity. Dumpert attempts to bypass any user-level hooks...
| | www.guardsquare.com
34.5 parsecs away

Travel
| Learn how attackers exploit Android apps, and how to stop them. Discover the typical attack process and key Android mobile app security strategies.