Explore >> Select a destination


You are here

scorpiosoftware.net
| | pentestlab.blog
3.5 parsecs away

Travel
| | DLL Proxy Loading is a technique which an arbitrary DLL exports the same functions as the legitimate DLL and forwards the calls to the legitimate DLL in an attempt to not disrupt the execution flow so the binary is executed as normal. The technique falls under the category of DLL Hijacking and it is typically...
| | modexp.wordpress.com
3.7 parsecs away

Travel
| | Introduction Quick post about Windows System calls that I forgot about working on after the release of Dumpert by Cn33liz last year, which is described in this post. Typically, EDR and AV set hooks on Win32 API or NT wrapper functions to detect and mitigate against malicious activity. Dumpert attempts to bypass any user-level hooks...
| | www.codeproject.com
4.2 parsecs away

Travel
| | A detailed analysis of how to inject the .NET runtime and arbitrary .NET assemblies into unmanaged and managed processes; and how to execute managed code within those processes.
| | www.securityjourney.com
23.2 parsecs away

Travel
| In this article, we compare the various methods that are used to detect vulnerabilities