|
You are here |
mem2019.github.io | ||
| | | | |
goggleheadedhacker.com
|
|
| | | | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | |
| | | | |
chovid99.github.io
|
|
| | | | | Security's blog made by Chovid99 | |
| | | | |
0x434b.dev
|
|
| | | | | This is a write-up for solving the devils-swapper RE challenge.?? It was mostly intended for my personal archive, but since it may be interesting to all of you. This especially applies if you're still rather new to the whole RE world, as the write-up turned out to be quite verbose. | |
| | | | |
wsummerhill.github.io
|
|
| | | I'm going to cover an example of how to perform a DLL sideload from start to finish using a C++ payload and a legitimate DLL commonly found on disk. The specific technique covered is known as "DLL proxying" where we use the legitimate DLL along with a malicious DLL which exports all the functions that the legit DLL to execute properly. | ||