Explore >> Select a destination


You are here

m417z.com
| | aixxe.net
9.9 parsecs away

Travel
| | Hello. I make video games do things they weren't supposed to do. This is my game hacking & reverse engineering blog, with variety development stuff in-between.
| | www.cobaltstrike.com
21.2 parsecs away

Travel
| | Learn UDRL's role in runtime masking, including how to track Beacon with BUD and loading an External C2 DLL at the same time as Beacon and mask both DLLs at runtime with Sleepmask-VS.
| | modexp.wordpress.com
16.1 parsecs away

Travel
| | Introduction Quick post about Windows System calls that I forgot about working on after the release of Dumpert by Cn33liz last year, which is described in this post. Typically, EDR and AV set hooks on Win32 API or NT wrapper functions to detect and mitigate against malicious activity. Dumpert attempts to bypass any user-level hooks...
| | insinuator.net
82.1 parsecs away

Travel
| From the end of 2019 on, we reported two critical vulnerabilities in the Ivanti DSM Suite to the vendor. The following CVE IDs were assigned to the issues (but note that they have a status of RESERVED, i.e. titles and descriptions may change in the future): CVE-2020-12441: Denial-of-Service (DoS) in Ivanti Service Manager HEAT Remote Control 7.4 CVE-2020-13793: Unsafe storage of AD cre ...