|
You are here |
repnz.github.io | ||
| | | | |
www.malwaretech.com
|
|
| | | | | Evading user mode EDR hooks by hijacking the AppVerifier layer | |
| | | | |
thewover.github.io
|
|
| | | | | TLDR: Presenting DInvoke, a new API in SharpSploit that acts as a dynamic replacement for PInvoke. Using it, we show how to dynamically invoke unmanaged code from memory or disk while avoiding API Hooking and suspicious imports. | |
| | | | |
www.huntandhackett.com
|
|
| | | | | After months of dedicated research we cover a wide range of concealed code execution techniques and investigate their mechanisms and how to detect them. | |
| | | | |
brunty.me
|
|
| | | Developer and problem solver | ||