Explore >> Select a destination


You are here

www.hutteman.com
| | www.williamjbowman.com
1.9 parsecs away

Travel
| | In a fit of nostalgia, I wanted to play some Runescape this weekend. I discovered that Runescape forbids copy and pasting your password into the client, for bogus security reasons. This poses a problem for me, since my password is a very long randomly gen...
| | mariocarrion.com
5.0 parsecs away

Travel
| | I'm starting the Mono POSIX shared memory wrapping, decided to begin dllimporting shm_open, however doesn't seems to be easy at all, my current effort is: using System; using System.Runtime.InteropServices; namespace Mono.Posix { public class SharedMemory { public SharedMemory () { } [DllImport ("librt", EntryPoint="shm_open", CharSet=CharSet.Ansi, CallingConvention=CallingConvention.StdCall)] public static extern IntPtr Open ( [MarshalAs (UnmanagedType.LPStr)] string name, int oflag, int mode_t); public...
| | anti-forensics.com
3.9 parsecs away

Travel
| | Simple C# application demonstrating how to kill running processes. In this case, the Digital Forensics software. C# Kill Process
| | wsummerhill.github.io
28.8 parsecs away

Travel
| I'm going to cover an example of how to perform a DLL sideload from start to finish using a C++ payload and a legitimate DLL commonly found on disk. The specific technique covered is known as "DLL proxying" where we use the legitimate DLL along with a malicious DLL which exports all the functions that the legit DLL to execute properly.