Explore >> Select a destination


You are here

mdanilor.github.io
| | gist.github.com
4.5 parsecs away

Travel
| | A very rough x64 POC for spoofing environment variables (similar to argument spoofing) with a focus on setting the COMPlus_ETWEnabled=0 var used to disable ETW in .NET - env_var_spoofing_poc.cpp
| | pwning.systems
4.8 parsecs away

Travel
| | I'm writing this post because I often hear that kernel exploitation is intimidating or difficult to learn. As a result, I've decided to start a series of basic bugs and exercises to get you started! Prerequisites Knowledge of the Linux command line Knowing how to read and write basic C may be beneficial Being able to debug with the help of a virtual computer or another system Able to install the kernel module compilation build requirements A basic understanding of the difference between userland and kern...
| | openpunk.com
4.6 parsecs away

Travel
| | Recently I faced a rather intimidating problem while working on a project. The problem was fairly simple from an objective point of view: "How do I load a DLL into a process on startup?" Now you might be wondering, "Why not just patch the IAT (import address table) on the executable and force it to load your payload DLL??" Yes! That was my exact thoughts too, however for reasons I'll explain it wasn't that simple.
| | www.alkanesolutions.co.uk
42.4 parsecs away

Travel
| This post contains a PowerShell Active Directory people picker, which is useful when we develop PowerShell forms that require searching for Active Directory