|
You are here |
cocomelonc.github.io | ||
| | | | |
0xboku.com
|
|
| | | | | [AI summary] This blog post discusses the process of modifying a TCP reverse shell shellcode to remove null characters, enabling its injection into host programs, and demonstrates its successful execution. | |
| | | | |
openpunk.com
|
|
| | | | | Recently I faced a rather intimidating problem while working on a project. The problem was fairly simple from an objective point of view: "How do I load a DLL into a process on startup?" Now you might be wondering, "Why not just patch the IAT (import address table) on the executable and force it to load your payload DLL??" Yes! That was my exact thoughts too, however for reasons I'll explain it wasn't that simple. | |
| | | | |
wsummerhill.github.io
|
|
| | | | | Malware Development Introduction (aka Malware Dev 101), Part 1 | |
| | | | |
cronop-io.github.io
|
|
| | | Walkthrough of a simple binary exploitation | ||