|
You are here |
scorpiosoftware.net | ||
| | | | |
www.codeproject.com
|
|
| | | | | A detailed analysis of how to inject the .NET runtime and arbitrary .NET assemblies into unmanaged and managed processes; and how to execute managed code within those processes. | |
| | | | |
openpunk.com
|
|
| | | | | Recently I faced a rather intimidating problem while working on a project. The problem was fairly simple from an objective point of view: "How do I load a DLL into a process on startup?" Now you might be wondering, "Why not just patch the IAT (import address table) on the executable and force it to load your payload DLL??" Yes! That was my exact thoughts too, however for reasons I'll explain it wasn't that simple. | |
| | | | |
cocomelonc.github.io
|
|
| | | | | ||
| | | | |
volatilityfoundation.org
|
|
| | | The Volatility Blog offers ongoing information to support the Volatility Foundation's open-source memory forensics framework. | ||