Explore >> Select a destination


You are here

redteaming.co.uk
| | pentestlab.blog
1.8 parsecs away

Travel
| | DLL Proxy Loading is a technique which an arbitrary DLL exports the same functions as the legitimate DLL and forwards the calls to the legitimate DLL in an attempt to not disrupt the execution flow so the binary is executed as normal. The technique falls under the category of DLL Hijacking and it is typically...
| | securityinaction.wordpress.com
4.4 parsecs away

Travel
| | TL; DR In recent months threat actors have been leveraging alternative means of compromising Windows based systems in order to evade detection. Make certain to download and install software from legitimate sources and where possible make use of the Windows driver blocklist (further recommendations listed below). ==================== By employing techniques such as DLL sideloading (defined...
| | wsummerhill.github.io
3.4 parsecs away

Travel
| | Malware Development Introduction (aka Malware Dev 101), Part 1
| | blog.pkh.me
18.3 parsecs away

Travel
|