You are here |
m417z.com | ||
| | | |
scorpiosoftware.net
|
|
| | | | In part 3 we implemented the bulk of what makes a DataStack - push, pop and clear operations. We noted a few remaining deficiencies that need to be taken care of. Let's begin. Object Destruction A DataStack object is deallocated when the last reference to it removed (typically all handles are closed). Any other cleanup... | |
| | | |
scorpiosoftware.net
|
|
| | | | The Application Verifier tool that is part of the Windows SDK provide a way to analyze processes for various types of misbehavior. The GUI provided looks like the following: Application Verifier application window To add an application, you can browse your file system and select an executable. The Application Verifier settings are based around the... | |
| | | |
bohops.com
|
|
| | | | Introduction Process Injection is a popular technique used by Red Teams and threat actors for defense evasion, privilege escalation, and other interesting use cases. At the time of this publishing, MITRE ATT&CK includes 12 (remote) process injection sub-techniques. Of course, there are numerous other examples as well as various and sundry derivatives. Recently, I was... | |
| | | |
helentronica.com
|
|
| | Introduction Some time ago I started a project of reusing an old, crappy toaster oven as a reflow solder oven. I did some necessary improvements on the oven, like adding a glass wool isolation. I also examined dynamic characteristics of the oven by looking at its transient response to a step input power. Everything was... |