Explore >> Select a destination


You are here

www.darkoperator.com
| | adsecurity.org
1.5 parsecs away

Travel
| | [AI summary] This article discusses the security features and benefits of PowerShell v5, including script block logging, system-wide transcripts, constrained PowerShell, and antimalware integration (AMSI) for enhanced system protection.
| | bohops.com
2.4 parsecs away

Travel
| | Introduction Greetings, Everyone! It has been several months since I've blogged, so it seems fitting to start the New Year off with a post about two topics that I thoroughly enjoy exploring: Application Control/Application Whitelisting (AWL) and the Component Object Model (COM). As the title suggests, I stumbled upon a technique for bypassing Microsoft Application...
| | forensicitguy.github.io
3.6 parsecs away

Travel
| | When analyzing even non-advanced malware nowadays it's common to find pretty heavy levels of obfuscation within samples. PowerShell and .NET malware for Windows can be obfuscated easily using various packers/crypters or script obfuscation tools. If you know how to manipulate the malware code, however, you can use the deobfuscation capabilities of malware to reveal unpacked samples.
| | stevenwaterman.uk
20.9 parsecs away

Travel
| I'm a software developer, technical coach, over-analyser. This is where I do those things. Mostly over-analysing.