Windows Heap Exploitation - From Heap Overflow to Arbitrary R/W
https://mrt4ntr4.github.io/Windows-Heap-Exploitation-dadadb/
https://mrt4ntr4.github.io/Windows-Heap-Exploitation-dadadb/
mrT4ntr4's Blog
Windows Heap Exploitation - From Heap Overflow to Arbitrary R/W
TLDR I was unable to find some good writeups/blogposts on Windows user mode heap exploitation which inspired me to write an introductory but practical post on Windows heap internals and exploitati
👍1
HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface https://share.google/ot3QjPEaGXlIeTcyY
Cyber Security News
HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface
The HydraPWK project's latest Apes-T1 snapshot refines its penetration-testing Linux distribution by replacing Elasticsearch with the open-source OpenSearch, resolving licensing issues and enhancing tools for industrial security assessments.
Reversing Microsoft Defender's signatures for evasion.
Deep dive into VDM guts - a gzip-compressed files with no encryption to evade entire signatures with just 1 byte change.
https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world
Deep dive into VDM guts - a gzip-compressed files with no encryption to evade entire signatures with just 1 byte change.
https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world