Explore >> Select a destination


You are here

m417z.com
| | modexp.wordpress.com
5.2 parsecs away

Travel
| | Introduction Quick post about Windows System calls that I forgot about working on after the release of Dumpert by Cn33liz last year, which is described in this post. Typically, EDR and AV set hooks on Win32 API or NT wrapper functions to detect and mitigate against malicious activity. Dumpert attempts to bypass any user-level hooks...
| | swordbytes.com
6.7 parsecs away

Travel
| | SwordBytes researchers have identified an Unauthenticated Remote Code Execution (RCE) vulnerability in Overwolf's Client Application by abusing a Reflected Cross-Site Scripting (XSS) issue present in the "overwolfstore://" URL handler. This vulnerability allows remote unauthenticated attackers to execute arbitrary commands on the underlying operating system that hosts Overwolf's Client Application.
| | www.malwaretech.com
4.4 parsecs away

Travel
| | Evading user mode EDR hooks by hijacking the AppVerifier layer
| | www.doctormonk.com
32.5 parsecs away

Travel
| A recent question for me from a reader of my ESP32 book (thanks Richard) was: how do I find out which pin the built-in LED (if there is on...