|
You are here |
gist.github.com | ||
| | | | |
blog.dornea.nu
|
|
| | | | | [AI summary] The blog post discusses the process of creating and executing a shellcode in C to read a file named 'flag.txt' and dump its content, including assembly code, compilation steps, and execution considerations. | |
| | | | |
www.skitoy.com
|
|
| | | | | Looking at event IO frameworks and found some really good comments about the "ev" library, the challenge is that I would rather work in C++ than pure C - I like ... | |
| | | | |
3.70.187.24
|
|
| | | | | [AI summary] The author discusses developing a TCP banner grabbing utility in C, encountering issues with port scanning and banner parsing, and seeks feedback on the code. | |
| | | | |
redteaming.co.uk
|
|
| | | DLL Side-Loading or DLL Proxy loading allows an attacker to abuse a legitimate and typically signed executable for code-execution on a compromised system. Mitre has been keeping a log of this technique since 2017, and it continues to be a popular option by threat actors (For good reasons!) Proxy loading is very similar to DLL... | ||