|
You are here |
bc-security.org | ||
| | | | |
intezer.com
|
|
| | | | | This deep dive aims to guide you through .NET reverse engineering, equipping you with the essential knowledge to analyze .NET malware. | |
| | | | |
wsummerhill.github.io
|
|
| | | | | Malware Development Introduction (aka Malware Dev 101), Part 1 | |
| | | | |
thewover.github.io
|
|
| | | | | TLDR: Presenting DInvoke, a new API in SharpSploit that acts as a dynamic replacement for PInvoke. Using it, we show how to dynamically invoke unmanaged code from memory or disk while avoiding API Hooking and suspicious imports. | |
| | | | |
henrikwarne.com
|
|
| | | Last month we finished reading "The Effective Engineer" by Edmond Lau in the book club at work. It is a great book full of practical advice on how to get more done as a software developer.In fact, it is one of the three books I think all programmers would benefit from reading (the other two... | ||