|
You are here |
repnz.github.io | ||
| | | | |
www.malwaretech.com
|
|
| | | | | Evading user mode EDR hooks by hijacking the AppVerifier layer | |
| | | | |
thewover.github.io
|
|
| | | | | TLDR: Presenting DInvoke, a new API in SharpSploit that acts as a dynamic replacement for PInvoke. Using it, we show how to dynamically invoke unmanaged code from memory or disk while avoiding API Hooking and suspicious imports. | |
| | | | |
m417z.com
|
|
| | | | | A couple of weeks ago, Windhawk, the customization marketplace for Windows programs, was released. You can read the announcement for more details and for the motivation behind creating it. In this post, I'll focus on my journey in implementing the technical aspects of Windhawk. If you prefer reading code to reading text, check out the demo implementation. | |
| | | | |
tarneo.fr
|
|
| | | Undergrad student and hacker of hardware and software | ||