Explore >> Select a destination


You are here

thevivi.net
| | pentestlaboratories.com
3.0 parsecs away

Travel
| | Microsoft .NET framework is being heavily utilized by threat actors and red teams for defense evasion and staying off the radar during operations. Every .NET binary contains application domains where assemblies are loaded in a safe manner. The AppDomainManager object can be used to create new ApplicationDomains inside a .NET process. From the perspective of...
| | bohops.com
2.6 parsecs away

Travel
| | Yes, you read that correctly - "Dynamic Pinvoke" as in "Dynamic Platform Invoke" Background Recently, I was browsing through Microsoft documentation and other blogs to gain a better understanding of .NET dynamic types and objects. I've always found the topic very interesting mainly due to its relative obscurity and the offensive opportunities for defensive evasion....
| | wsummerhill.github.io
2.0 parsecs away

Travel
| | Malware Development Introduction (aka Malware Dev 101), Part 1
| | blog.0x7d0.dev
7.0 parsecs away

Travel
| The AES algorithm is widely used today, whether it's for encrypting a connection to a website, encrypting data on your hard drive, or storing passwords in your favorite password manager. It has been battle-tested for many decades and is still recommended as one of the most secure algorithms. In this article, I explain how AES encryption works and how the algorithm is implemented.