Explore >> Select a destination


You are here

cocomelonc.github.io
| | 0xboku.com
3.4 parsecs away

Travel
| | [AI summary] This blog post discusses the process of modifying a TCP reverse shell shellcode to remove null characters, enabling its injection into host programs, and demonstrates its successful execution.
| | openpunk.com
2.9 parsecs away

Travel
| | Recently I faced a rather intimidating problem while working on a project. The problem was fairly simple from an objective point of view: "How do I load a DLL into a process on startup?" Now you might be wondering, "Why not just patch the IAT (import address table) on the executable and force it to load your payload DLL??" Yes! That was my exact thoughts too, however for reasons I'll explain it wasn't that simple.
| | wsummerhill.github.io
2.7 parsecs away

Travel
| | Malware Development Introduction (aka Malware Dev 101), Part 1
| | cronop-io.github.io
25.7 parsecs away

Travel
| Walkthrough of a simple binary exploitation