Explore >> Select a destination


You are here

mem2019.github.io
| | goggleheadedhacker.com
6.0 parsecs away

Travel
| | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application.
| | chovid99.github.io
3.2 parsecs away

Travel
| | Security's blog made by Chovid99
| | 0x434b.dev
5.7 parsecs away

Travel
| | This is a write-up for solving the devils-swapper RE challenge.?? It was mostly intended for my personal archive, but since it may be interesting to all of you. This especially applies if you're still rather new to the whole RE world, as the write-up turned out to be quite verbose.
| | wsummerhill.github.io
21.8 parsecs away

Travel
| I'm going to cover an example of how to perform a DLL sideload from start to finish using a C++ payload and a legitimate DLL commonly found on disk. The specific technique covered is known as "DLL proxying" where we use the legitimate DLL along with a malicious DLL which exports all the functions that the legit DLL to execute properly.