Mitigating Program Tampering and Bypassing AV/EDR Through Blocking Operations on Executable Memory Pages
|
|
2
|
12693
|
November 23, 2023
|
Resources To Learn Everything Hacking Related
|
|
7
|
19610
|
August 30, 2023
|
How to Hack VNC with Metasploit – Ethical Hacking Tutorial
|
|
1
|
14126
|
July 6, 2023
|
Need advice on unpacking .dll
|
|
2
|
11120
|
October 18, 2023
|
Havoc C2 Framework for Kali
|
|
0
|
9598
|
June 2, 2023
|
Own a Windows Keyboard
|
|
7
|
14177
|
August 15, 2023
|
Having trouble with evilginx2, need help
|
|
0
|
11530
|
May 14, 2023
|
Arch - Black ! (0x0)
|
|
9
|
40659
|
April 29, 2023
|
Where do I go from here?
|
|
1
|
16365
|
March 28, 2023
|
Exploit Development 101
|
|
2
|
13593
|
July 26, 2023
|
How to master Android Forensics?
|
|
1
|
20916
|
March 21, 2023
|
Book Thread - What's-a-reading?
|
|
8
|
17390
|
March 17, 2023
|
Unlock Windows 11 personalization settings by modifying Settings app DLL
|
|
3
|
13152
|
July 6, 2023
|
Metamorphic Malware
|
|
3
|
12565
|
May 15, 2023
|
How to use hard-coded keys for two parties to form key agreement using ECDH from cryptopp library?
|
|
1
|
11931
|
May 22, 2023
|
Pentesting: The truth behind the myth
|
|
3
|
24372
|
January 4, 2023
|
Modified CVE-2019-6714 PoC to execute payload via mshta.exe
|
|
1
|
14090
|
May 2, 2023
|
The Dilemma of Attacking Okta, Red Team Operations
|
|
4
|
14660
|
April 6, 2023
|
Self XSS, The Epitome of Social Engineering
|
|
1
|
12306
|
March 10, 2023
|
XORCry - a simple python ransomware
|
|
6
|
19032
|
January 10, 2023
|
A GraphQL tale: What else is in there besides introspection?
|
|
4
|
14775
|
January 12, 2023
|
Writing a simple rootkit for linux
|
|
9
|
40870
|
August 15, 2022
|
Awesome malware development resources
|
|
21
|
33915
|
August 14, 2022
|
C# Hash Cracking
|
|
1
|
21648
|
July 5, 2022
|
Blumentals Surfblocker v5.x password exploitation - PoiSoN
|
|
6
|
21161
|
May 20, 2022
|
[GoLang] Executing fileless scripts
|
|
11
|
22320
|
April 10, 2022
|
Using Social Engineer Toolkit tutorial (Part 2)
|
|
1
|
18694
|
April 4, 2022
|
Using Social Engineer Toolkit tutorial (Part 1)
|
|
2
|
21085
|
July 30, 2022
|
Bypassing Antivirus Userland hooks with direct system calls in x64 bit with syswow64
|
|
5
|
24202
|
May 6, 2022
|
Can Responder take down infrastructure?
|
|
2
|
18917
|
February 20, 2022
|