|
You are here |
bruteratel.com | ||
| | | | |
modexp.wordpress.com
|
|
| | | | | Introduction Quick post about Windows System calls that I forgot about working on after the release of Dumpert by Cn33liz last year, which is described in this post. Typically, EDR and AV set hooks on Win32 API or NT wrapper functions to detect and mitigate against malicious activity. Dumpert attempts to bypass any user-level hooks... | |
| | | | |
cocomelonc.github.io
|
|
| | | | | ||
| | | | |
oldboy21.github.io
|
|
| | | | | Ciao World, since I can't get enough of playing around with the Reflective DLL that inspired the very first blog during the Christmas Holiday, after the YOLO Loader I decided to grant the little nasty DLL a new super-power: Indirect syscalls So what I will be addressing here is: Indirect syscall: why and (mostly) references SSN enum and PIC challenges 1 tb of MASM Disclaimer I write code and implement techniques for research and learning purposes only. | |
| | | | |
www.catch22.net
|
|
| | | This tutorial will show a simple technique for customizing a standard Windows message-box. A standard message-box is not usually customizable, because you are never normally able to find it's window handle. This is because the MessageBox API call only returns control to a program when the message-box has been destroyed. | ||