|
You are here |
pentestlab.blog | ||
| | | | |
mazinahmed.net
|
|
| | | | | Application and Infrastructure Security Engineering | |
| | | | |
sensepost.com
|
|
| | | | | Leaders in Information Security | |
| | | | |
pentestlaboratories.com
|
|
| | | | | Microsoft .NET framework is being heavily utilized by threat actors and red teams for defense evasion and staying off the radar during operations. Every .NET binary contains application domains where assemblies are loaded in a safe manner. The AppDomainManager object can be used to create new ApplicationDomains inside a .NET process. From the perspective of... | |
| | | | |
yasoob.me
|
|
| | | Hi everyone! ?? If you have been following my blog then you might have already read the article on reverse engineering an Android app by writing custom smali code. I am still very much a reverse engineering beginner so after that article, I got to learn about Frida. I was told that Frida is much faster and a lot easier for scenarios where I want to snoop on functions. Well, I am glad to report that all the suggestions were absolutely correct. | ||