Explore >> Select a destination


You are here

www.darkoperator.com
| | adsecurity.org
1.5 parsecs away

Travel
| | [AI summary] This article discusses the security features and benefits of PowerShell v5, including script block logging, system-wide transcripts, constrained PowerShell, and antimalware integration (AMSI) for enhanced system protection.
| | mcuoneclipse.com
3.7 parsecs away

Travel
| | This is a new article in my series about using Microsoft Visual Studio Code: After installation, project setup, building, debugging, setting up a kit, IntelliSense and FreeRTOS. This one is about setting up and using the xPack Extension to build cross-platform-multi-tool project with a project manager. Outline If you have read the comments and discussions...
| | forensicitguy.github.io
3.7 parsecs away

Travel
| | When analyzing even non-advanced malware nowadays it's common to find pretty heavy levels of obfuscation within samples. PowerShell and .NET malware for Windows can be obfuscated easily using various packers/crypters or script obfuscation tools. If you know how to manipulate the malware code, however, you can use the deobfuscation capabilities of malware to reveal unpacked samples.
| | thume.ca
41.5 parsecs away

Travel
| [AI summary] This blog post by Tristan Hume details his experience writing a compiler for a course project using Rust. He discusses various aspects of the project including the use of Rust's powerful enums and pattern matching, handling variable and type resolution, reference counting with Rc, code generation for x86 assembly, and the use of usercorn to run Linux binaries on macOS. The post also reflects on the challenges and benefits of using Rust for such a project, comparing it with other languages and design decisions.