Explore >> Select a destination


You are here

openpunk.com
| | scorpiosoftware.net
2.5 parsecs away

Travel
| | The Application Verifier tool that is part of the Windows SDK provide a way to analyze processes for various types of misbehavior. The GUI provided looks like the following: Application Verifier application window To add an application, you can browse your file system and select an executable. The Application Verifier settings are based around the...
| | pentestlab.blog
2.9 parsecs away

Travel
| | DLL Proxy Loading is a technique which an arbitrary DLL exports the same functions as the legitimate DLL and forwards the calls to the legitimate DLL in an attempt to not disrupt the execution flow so the binary is executed as normal. The technique falls under the category of DLL Hijacking and it is typically...
| | www.codeproject.com
3.0 parsecs away

Travel
| | A detailed analysis of how to inject the .NET runtime and arbitrary .NET assemblies into unmanaged and managed processes; and how to execute managed code within those processes.
| | blog.trailofbits.com
29.0 parsecs away

Travel
| By Alan Cao If you love exploit mitigations, you may have heard of a new system call named mseal landing into the Linux kernel's 6.10 release, providing a protection called "memory sealing." Beyond notes from the authors, very little information about this mitigation exists. In this blog post, we'll explain what this syscall is, including...