|
You are here |
mdanilor.github.io | ||
| | | | |
cocomelonc.github.io
|
|
| | | | | [AI summary] A technical blog post demonstrates how to create a custom implementation of the WinAPI GetModuleHandle function to evade antivirus detection in malware, including code examples for PEB manipulation and string encryption. | |
| | | | |
pwning.systems
|
|
| | | | | I'm writing this post because I often hear that kernel exploitation is intimidating or difficult to learn. As a result, I've decided to start a series of basic bugs and exercises to get you started! Prerequisites Knowledge of the Linux command line Knowing how to read and write basic C may be beneficial Being able to debug with the help of a virtual computer or another system Able to install the kernel module compilation build requirements A basic understanding of the difference between userland and kern... | |
| | | | |
gist.github.com
|
|
| | | | | A very rough x64 POC for spoofing environment variables (similar to argument spoofing) with a focus on setting the COMPlus_ETWEnabled=0 var used to disable ETW in .NET - env_var_spoofing_poc.cpp | |
| | | | |
www.github.com
|
|
| | | my blog, with astro. Contribute to Krayorn/blog development by creating an account on GitHub. | ||