Explore >> Select a destination


You are here

m417z.com
| | scorpiosoftware.net
19.5 parsecs away

Travel
| | In part 3 we implemented the bulk of what makes a DataStack - push, pop and clear operations. We noted a few remaining deficiencies that need to be taken care of. Let's begin. Object Destruction A DataStack object is deallocated when the last reference to it removed (typically all handles are closed). Any other cleanup...
| | scorpiosoftware.net
11.8 parsecs away

Travel
| | The Application Verifier tool that is part of the Windows SDK provide a way to analyze processes for various types of misbehavior. The GUI provided looks like the following: Application Verifier application window To add an application, you can browse your file system and select an executable. The Application Verifier settings are based around the...
| | bohops.com
12.5 parsecs away

Travel
| | Introduction Process Injection is a popular technique used by Red Teams and threat actors for defense evasion, privilege escalation, and other interesting use cases. At the time of this publishing, MITRE ATT&CK includes 12 (remote) process injection sub-techniques. Of course, there are numerous other examples as well as various and sundry derivatives. Recently, I was...
| | helentronica.com
86.0 parsecs away

Travel
| Introduction Some time ago I started a project of reusing an old, crappy toaster oven as a reflow solder oven. I did some necessary improvements on the oven, like adding a glass wool isolation. I also examined dynamic characteristics of the oven by looking at its transient response to a step input power. Everything was...