Explore >> Select a destination


You are here

redops.at
| | wsummerhill.github.io
4.2 parsecs away

Travel
| | Malware Development Introduction (aka Malware Dev 101), Part 1
| | www.cobaltstrike.com
3.7 parsecs away

Travel
| | See how to instrument Beacon via BeaconGate and walk through return address spoofing, indirect syscalls, and a call stack spoofing technique, Draugr.
| | www.malwaretech.com
2.1 parsecs away

Travel
| | Understanding the basics of user mode EDR hooking, common bypass techniques, and their limitations.
| | danielmangum.com
19.0 parsecs away

Travel
| Note: all analysis and code samples used in this post correspond to the v3.3.0 release of Zephyr. Having a good debugging workflow is critical to developing software quickly with high confidence. Fortunately, writing software for computers is often done, well, on a computer, meaning that while writing programs we can run other programs that help us understand the behavior of what we are writing. Typically the machine we are writing software for, though it may run in a data center and have a different for...