Explore >> Select a destination


You are here

0xcybery.github.io
| | crocidb.com
4.9 parsecs away

Travel
| | Following my first GameBoy, the DMG, now I got a GameBoy color and replaced the buttons and gave it a clean. Also Update on my game for the platform
| | wsummerhill.github.io
5.2 parsecs away

Travel
| | I'm going to cover an example of how to perform a DLL sideload from start to finish using a C++ payload and a legitimate DLL commonly found on disk. The specific technique covered is known as "DLL proxying" where we use the legitimate DLL along with a malicious DLL which exports all the functions that the legit DLL to execute properly.
| | corvid.cafe
4.4 parsecs away

Travel
| | [AI summary] The author discusses the development and implementation of the Uxn virtual machine, including its opcode set, memory operations, and a detailed breakdown of the 'Hello world' program using Uxn's unique assembly language.
| | thewover.github.io
28.6 parsecs away

Travel
| TLDR: Presenting DInvoke, a new API in SharpSploit that acts as a dynamic replacement for PInvoke. Using it, we show how to dynamically invoke unmanaged code from memory or disk while avoiding API Hooking and suspicious imports.