Explore >> Select a destination


You are here

bohops.com
| | pentestlaboratories.com
4.7 parsecs away

Travel
| | Microsoft .NET framework is being heavily utilized by threat actors and red teams for defense evasion and staying off the radar during operations. Every .NET binary contains application domains where assemblies are loaded in a safe manner. The AppDomainManager object can be used to create new ApplicationDomains inside a .NET process. From the perspective of...
| | mariocarrion.com
10.2 parsecs away

Travel
| | I'm starting the Mono POSIX shared memory wrapping, decided to begin dllimporting shm_open, however doesn't seems to be easy at all, my current effort is: using System; using System.Runtime.InteropServices; namespace Mono.Posix { public class SharedMemory { public SharedMemory () { } [DllImport ("librt", EntryPoint="shm_open", CharSet=CharSet.Ansi, CallingConvention=CallingConvention.StdCall)] public static extern IntPtr Open ( [MarshalAs (UnmanagedType.LPStr)] string name, int oflag, int mode_t); public...
| | intezer.com
8.9 parsecs away

Travel
| | This deep dive aims to guide you through .NET reverse engineering, equipping you with the essential knowledge to analyze .NET malware.
| | blog.flanker017.me
130.2 parsecs away

Travel
| The Journey of a complete OSX privilege escalation with a single vulnerability - Part 1 In previous blog posts Liang talked about the userspace privilege escalation vulnerability we found in ...