|
You are here |
toddcullumresearch.com | ||
| | | | |
www.redblue.team
|
|
| | | | | There's certainly no shortage of malware in Ukraine right now! One of my resolutions for the New Year is to spend more time conducting ... | |
| | | | |
www.forrest-orr.net
|
|
| | | | | IntroductionWith fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and detection is becoming an increasingly valuable skill to add to both an attacker and defender's arsenal. I've written this text with the intention of further improving the skill of the reader as relating to the topic of memory stealth on Windows both when designing and defending against such malware. First by introducing my open source memory scanner tool Moneta | |
| | | | |
keyj.emphy.de
|
|
| | | | | [AI summary] The article discusses the process of creating ultra-small Windows executables by optimizing the PE (Portable Executable) format. KeyJ, the author, details various techniques such as removing sections, collapsing headers, and using hash-based import lookups to minimize the executable size. The article also includes comments from readers discussing the challenges and successes of these optimizations, as well as the importance of compatibility across different Windows versions. The final executable size is reduced to around 268 bytes, and the author acknowledges the trade-offs between size and compatibility. | |
| | | | |
golangbot.com
|
|
| | | Arrays are collection of elements of the same type. A slice in Go is a convenient wrapper on top of array. | ||