|
You are here |
intezer.com | ||
| | | | |
pentestlaboratories.com
|
|
| | | | | Microsoft .NET framework is being heavily utilized by threat actors and red teams for defense evasion and staying off the radar during operations. Every .NET binary contains application domains where assemblies are loaded in a safe manner. The AppDomainManager object can be used to create new ApplicationDomains inside a .NET process. From the perspective of... | |
| | | | |
wsummerhill.github.io
|
|
| | | | | Malware Development Introduction (aka Malware Dev 101), Part 1 | |
| | | | |
toddcullumresearch.com
|
|
| | | | | Important Disclaimer YOU MUST READ FIRST! Portions of this article contain source code from the Windows Research Kernel. This code is the intellectual property of Microsoft Corporation. I am using this code under special license in this post under these grounds of the license agreement: You may distribute snippets of this software in research... Read More | |
| | | | |
dehora.net
|
|
| | | Back in 2013, I started a series of posts on programming languages I found interesting. One of the languages I wanted to write about at that time was Rust. As often happens, life got in the way, and it's only now that I'm coming round to a long overdue post. This is one of a series of posts on programming languages and you can read more about thathere. | ||