|
You are here |
www.darkoperator.com | ||
| | | | |
adsecurity.org
|
|
| | | | | [AI summary] This article discusses the security features and benefits of PowerShell v5, including script block logging, system-wide transcripts, constrained PowerShell, and antimalware integration (AMSI) for enhanced system protection. | |
| | | | |
bohops.com
|
|
| | | | | Introduction Greetings, Everyone! It has been several months since I've blogged, so it seems fitting to start the New Year off with a post about two topics that I thoroughly enjoy exploring: Application Control/Application Whitelisting (AWL) and the Component Object Model (COM). As the title suggests, I stumbled upon a technique for bypassing Microsoft Application... | |
| | | | |
forensicitguy.github.io
|
|
| | | | | When analyzing even non-advanced malware nowadays it's common to find pretty heavy levels of obfuscation within samples. PowerShell and .NET malware for Windows can be obfuscated easily using various packers/crypters or script obfuscation tools. If you know how to manipulate the malware code, however, you can use the deobfuscation capabilities of malware to reveal unpacked samples. | |
| | | | |
stevenwaterman.uk
|
|
| | | I'm a software developer, technical coach, over-analyser. This is where I do those things. Mostly over-analysing. | ||