#reversing
Decompilation Debugging: Pretending All Binaries Come With Source Code
https://clearbluejar.github.io/posts/decompilation-debugging-pretending-all-binaries-come-with-source-code
Decompilation Debugging: Pretending All Binaries Come With Source Code
https://clearbluejar.github.io/posts/decompilation-debugging-pretending-all-binaries-come-with-source-code
clearbluejar
Decompilation Debugging
Debugging an application can provide the insight needed troubleshoot a subtle bug in your software. Normally, when debugging, you have source code and data type information (aka symbols) to help navigate your application. In the world of Reverse Engineering…
proc_inj_win_thr_pool.pdf
4.8 MB
#Red_Team_Tactics
Black Hat Europe 2023:
"New Process Injection Techniques Using Windows Thread Pools".
]-> https://github.com/SafeBreach-Labs/PoolParty
]-> https://www.safebreach.com/blog/process-injection-using-windows-thread-pools
Black Hat Europe 2023:
"New Process Injection Techniques Using Windows Thread Pools".
]-> https://github.com/SafeBreach-Labs/PoolParty
]-> https://www.safebreach.com/blog/process-injection-using-windows-thread-pools
#Malware_analysis
Qilin Ransomware
https://www.shadowstackre.com/analysis/qilin
The csharp-streamer RAT
https://cyber.wtf/2023/12/06/the-csharp-streamer-rat
Qilin Ransomware
https://www.shadowstackre.com/analysis/qilin
The csharp-streamer RAT
https://cyber.wtf/2023/12/06/the-csharp-streamer-rat
#Malware_analysis
1. Deep Analysis of Vidar Stealer
https://m4lcode.github.io/malware%20analysis/vidar
2. Racoon Malware
https://paper.seebug.org/3084
1. Deep Analysis of Vidar Stealer
https://m4lcode.github.io/malware%20analysis/vidar
2. Racoon Malware
https://paper.seebug.org/3084
#windows #windows_programming
#win_api
Windows programming cpp
Page: 9768
Has everything even msdn
https://downloads.ctfassets.net/9pcn2syx7zns/5CXo2K1jPkd1w8Rj7kZe75/a4bd3d4da85a5e868c34ab7489842944/c___2.pdf
#win_api
Windows programming cpp
Page: 9768
Has everything even msdn
https://downloads.ctfassets.net/9pcn2syx7zns/5CXo2K1jPkd1w8Rj7kZe75/a4bd3d4da85a5e868c34ab7489842944/c___2.pdf
#windows #win_api #windows_programming
CPP / C++ Notes - Windows API Programming Win32
https://caiorss.github.io/C-Cpp-Notes/WindowsAPI-cpp.html
CPP / C++ Notes - Windows API Programming Win32
https://caiorss.github.io/C-Cpp-Notes/WindowsAPI-cpp.html
caiorss.github.io
CPP / C++ Notes - Windows API Programming Win32
cpp/c++ code examples and demonstrations.
This is Librium, an open-source library for you with AI
You didn't understand that sentence? Just select it and ask AI !
You can easily see your progress highlight sentences, and you have 2 GB of free storage to keep your books :)
https://librumreader.com/
You didn't understand that sentence? Just select it and ask AI !
You can easily see your progress highlight sentences, and you have 2 GB of free storage to keep your books :)
https://librumreader.com/
🤔2👍1
#malware_dev
https://malware.news/t/malware-development-persistence-part-23-lnk-files-simple-powershell-example/76513
https://malware.news/t/malware-development-persistence-part-23-lnk-files-simple-powershell-example/76513
Malware Analysis, News and Indicators
Malware development: persistence - part 23. LNK files. Simple Powershell example
﷽ Hello, cybersecurity enthusiasts and white hackers! This post is based on my own research into one of the more interesting malware persistence tricks: via Windows LNK files. LNK According to Microsoft, an LNK file serves as a shortcut or “link” in…
https://lsecqt.github.io/Red-Teaming-Army/malware-development/weaponizing-dll-hijacking-via-dll-proxying/
#malware_dev , #dll , #hijacking , #proxy
#malware_dev , #dll , #hijacking , #proxy
lsecqt.github.io
Weaponizing DLL Hijacking via DLL Proxying
Dynamic Link Library (DLL) is a collection of code that can be shared across multiple processes in Windows.
Process Injection - Avoiding Kernel Triggered Memory Scans.
r-tec.net/r-tec-blog-process…
#windows , #process_injection , #memory_scan
r-tec.net/r-tec-blog-process…
#windows , #process_injection , #memory_scan
❤🔥2
https://github.com/0xEr3bus/PoolPartyBof
A beacon object file implementation of PoolParty Process Injection Technique.
#github #tools #cs
A beacon object file implementation of PoolParty Process Injection Technique.
#github #tools #cs
GitHub
GitHub - 0xEr3bus/PoolPartyBof: A beacon object file implementation of PoolParty Process Injection Technique.
A beacon object file implementation of PoolParty Process Injection Technique. - 0xEr3bus/PoolPartyBof
❤🔥1