You are here |
scorpiosoftware.net | ||
| | | |
modexp.wordpress.com
|
|
| | | | Introduction The surveillance spyware FinFisher, also known as FinSpy, uses what Microsoft called an "interesting and quite unusual" method of process injection via the KernelCallBackTable. The method of injection has been used for 10+ years by the game hacking community to cheat and no doubt used for other nefarious purposes longer. My intention with this... | |
| | | |
m417z.com
|
|
| | | | In one of my previous blog posts, Implementing Global Injection and Hooking in Windows, I wrote about my journey in implementing global DLL injection for Windhawk, the customization marketplace for Windows programs. If you haven't read it yet, I invite you to read it, but the bottom line is that I ended up with an implementation that enumerates all processes and injects the DLL into each of them. To make sure the DLL is also loaded in newly created processes, the implementation intercepts new process cre... | |
| | | |
modexp.wordpress.com
|
|
| | | | Introduction Quick post about Windows System calls that I forgot about working on after the release of Dumpert by Cn33liz last year, which is described in this post. Typically, EDR and AV set hooks on Win32 API or NT wrapper functions to detect and mitigate against malicious activity. Dumpert attempts to bypass any user-level hooks... | |
| | | |
andreabergia.com
|
|
| | This post is part of the Writing a JVM in Rust series. I have written a JVM in Rust A JVM in Rust part 2 - The class files format ??thispost A JVM in Rust part 3 - Parsing class files A JVM in Rust part 4 - The Java bytecode A JVM in Rust part 5 - Executing instructions A JVM in Rust part 6 - Methods and exceptions A JVM in Rust part 7 - Objects and GC A JVM in Rust part 8 - Retrospective In this post, I will discuss the . |