|
You are here |
toddcullumresearch.com | ||
| | | | |
blog.jchw.io
|
|
| | | | | A blog about software. | |
| | | | |
oldboy21.github.io
|
|
| | | | | Reflective DLL After some time spent on implementing a Reflective DLL and its beloved Loader/Injector I thought that it could have been a very great first topic for what it might become a long-ish series of blog posts about security, but mostly struggles and C(++). First reason is that I felt like I was struggling a bit finding resources that would really take the topic as a whole and explain any single step, and the reasoning behind it. | |
| | | | |
intezer.com
|
|
| | | | | This deep dive aims to guide you through .NET reverse engineering, equipping you with the essential knowledge to analyze .NET malware. | |
| | | | |
www.deepinstinct.com
|
|
| | | BPFdoor is a Linux-specific, low-profile, passive backdoor intended to maintain a persistent, long-term foothold in already-breached networks and environments and functions primarily to ensure an attacker can re-enter an infected system over an extended period of time, post-compromise. The malware gets its name from its usage of a Berkley Packet Filter - a fairly unique way of receiving its instructions and evading detection, which bypasses firewall restrictions on incoming traffic. | ||