2025.03.12 - Hack The Sandbox - Unveiling the Truth Behind Disappearing Artifacts.pdf
Size:
6.77 MB
Last modified:
2025/04/14
2025.01.28 - ScatterBrain - Unmasking the Shadow of PoisonPlugs Obfuscator.pdf
Size:
9.28 MB
Last modified:
2025/04/14
2023-06-05 - Abusing undocumented features to spoof PE section headers.pdf
Size:
0.22 MB
Last modified:
2025/04/14
2023-05-17 - VBA resolving exports in runtime without NtQueryInformationProcess or GetProcAddress.pdf
Size:
0.97 MB
Last modified:
2025/04/14
2023-05-02 - Preventing application creation by IFEO keys.png
Size:
0.09 MB
Last modified:
2025/04/14
2023-03-19 - Different ways to create a process.html
Size:
0.08 MB
Last modified:
2025/04/14
2022-10-13 - Random Number Generation using IOCTL.txt
Size:
0.00 MB
Last modified:
2025/04/14
2022-06-22 - Extracting Whitelisted Paths from Windows Defender ASR Rules.pdf
Size:
0.91 MB
Last modified:
2025/04/14
2022-04-19 - Dumping passwords using KRShowKeyMgr.PNG
Size:
0.18 MB
Last modified:
2025/04/14
2022-01-31 - Abusing the MS Office protocol scheme.pdf
Size:
1.91 MB
Last modified:
2025/04/14
2021-10-21 - Life is Pane - Persistence via Preview Handlers.pdf
Size:
0.56 MB
Last modified:
2025/04/14
2021-05-01 - Symantec Endpoint Protection Meets COM - Using Symantec.SSHelper As A LOLBIN.pdf
Size:
0.47 MB
Last modified:
2025/04/14
2021-04-22 - Binary Data Hiding in VB6 Executables.pdf
Size:
0.41 MB
Last modified:
2025/04/14
2020-10-12 - In-Process Execute Assembly and MailSlots.pdf
Size:
0.36 MB
Last modified:
2025/04/14
2020-10-11 - From a C project through assembly to shellcode.pdf
Size:
1.33 MB
Last modified:
2025/04/14
2018-09-09 - Finding Interactive User COM Objects using PowerShell.pdf
Size:
0.13 MB
Last modified:
2025/04/14
2015-12-05 - Abusing WMI To Build A Persistent Asynchronous And Fileless Backdoor.pdf
Size:
0.97 MB
Last modified:
2025/04/14
2006-05-22 - Windows Network Services Internals.pdf
Size:
1.69 MB
Last modified:
2025/04/14