Online C++ to Assembly Converter
(+) CodeConvert
(+) Compiler Explorer
(+) Code Beautify
(+) C to VSCPU ASM Converter
(+) ConV
(+) CtoAssembly
#reverse #useful
(+) CodeConvert
(+) Compiler Explorer
(+) Code Beautify
(+) C to VSCPU ASM Converter
(+) ConV
(+) CtoAssembly
#reverse #useful
❤🔥1
Source Byte pinned «https://www.safebreach.com/blog/process-injection-using-windows-thread-pools/»
https://de-engineer.github.io/Processes-threads-jobs-fibers/
#windows , #windows_internals , #Thread , #Fiber , #Jobs , #basics
#windows , #windows_internals , #Thread , #Fiber , #Jobs , #basics
de engineering
A deep dive into Processes, Threads, Fibers and Jobs on Windows.
This blog post covers a brief overview of Processes, Threads, Fibers, Jobs and their components on Windows and how the Windows API can be used to work with them.
Forwarded from امنیت سایبری | Cyber Security
Please open Telegram to view this post
VIEW IN TELEGRAM
❤🔥1👍1
System Calls Using Go
In this chapter, you will explore writing applications that perform system-level operations using system calls. The operating system provides a lot of ways for applications to extract information and perform operations. You will look at the different ways to extract system-level information and use both the Go standard library and system files.
#book , #Go , #introduction
In this chapter, you will explore writing applications that perform system-level operations using system calls. The operating system provides a lot of ways for applications to extract information and perform operations. You will look at the different ways to extract system-level information and use both the Go standard library and system files.
#book , #Go , #introduction
❤🔥1👍1
#reversing
Decompilation Debugging: Pretending All Binaries Come With Source Code
https://clearbluejar.github.io/posts/decompilation-debugging-pretending-all-binaries-come-with-source-code
Decompilation Debugging: Pretending All Binaries Come With Source Code
https://clearbluejar.github.io/posts/decompilation-debugging-pretending-all-binaries-come-with-source-code
clearbluejar
Decompilation Debugging
Debugging an application can provide the insight needed troubleshoot a subtle bug in your software. Normally, when debugging, you have source code and data type information (aka symbols) to help navigate your application. In the world of Reverse Engineering…
proc_inj_win_thr_pool.pdf
4.8 MB
#Red_Team_Tactics
Black Hat Europe 2023:
"New Process Injection Techniques Using Windows Thread Pools".
]-> https://github.com/SafeBreach-Labs/PoolParty
]-> https://www.safebreach.com/blog/process-injection-using-windows-thread-pools
Black Hat Europe 2023:
"New Process Injection Techniques Using Windows Thread Pools".
]-> https://github.com/SafeBreach-Labs/PoolParty
]-> https://www.safebreach.com/blog/process-injection-using-windows-thread-pools
#Malware_analysis
Qilin Ransomware
https://www.shadowstackre.com/analysis/qilin
The csharp-streamer RAT
https://cyber.wtf/2023/12/06/the-csharp-streamer-rat
Qilin Ransomware
https://www.shadowstackre.com/analysis/qilin
The csharp-streamer RAT
https://cyber.wtf/2023/12/06/the-csharp-streamer-rat
#Malware_analysis
1. Deep Analysis of Vidar Stealer
https://m4lcode.github.io/malware%20analysis/vidar
2. Racoon Malware
https://paper.seebug.org/3084
1. Deep Analysis of Vidar Stealer
https://m4lcode.github.io/malware%20analysis/vidar
2. Racoon Malware
https://paper.seebug.org/3084
#windows #windows_programming
#win_api
Windows programming cpp
Page: 9768
Has everything even msdn
https://downloads.ctfassets.net/9pcn2syx7zns/5CXo2K1jPkd1w8Rj7kZe75/a4bd3d4da85a5e868c34ab7489842944/c___2.pdf
#win_api
Windows programming cpp
Page: 9768
Has everything even msdn
https://downloads.ctfassets.net/9pcn2syx7zns/5CXo2K1jPkd1w8Rj7kZe75/a4bd3d4da85a5e868c34ab7489842944/c___2.pdf