Forwarded from Волосатый бублик
#shellcode #bruteforce #teb #winapi
Windows 32-bit Shellcode Design without TEB & fs:30h
https://gist.github.com/aaaddress1/86a70ace478a905b8147b0803d5dacfc
Windows 32-bit Shellcode Design without TEB & fs:30h
https://gist.github.com/aaaddress1/86a70ace478a905b8147b0803d5dacfc
Gist
Windows 32-bit Shellcode Design without TEB & fs:30h
Windows 32-bit Shellcode Design without TEB & fs:30h - memBruteforce.cpp
Forwarded from Волосатый бублик
#LoadLibrary #memory
LoadLibrary for offensive operations (from disk, memory + don't link to PEB )
https://github.com/bats3c/DarkLoadLibrary
LoadLibrary for offensive operations (from disk, memory + don't link to PEB )
https://github.com/bats3c/DarkLoadLibrary
GitHub
GitHub - bats3c/DarkLoadLibrary: LoadLibrary for offensive operations
LoadLibrary for offensive operations. Contribute to bats3c/DarkLoadLibrary development by creating an account on GitHub.
Forwarded from GitHub repos
blasty/CVE-2021-41773
CVE-2021-41773 playground
Language: Dockerfile
Stars: 153 Issues: 1 Forks: 37
https://github.com/blasty/CVE-2021-41773
CVE-2021-41773 playground
Language: Dockerfile
Stars: 153 Issues: 1 Forks: 37
https://github.com/blasty/CVE-2021-41773
GitHub
GitHub - blasty/CVE-2021-41773: CVE-2021-41773 playground
CVE-2021-41773 playground. Contribute to blasty/CVE-2021-41773 development by creating an account on GitHub.
Forwarded from RME-DisCo @ UNIZAR [www.reversea.me]
Reverse Engineering Adventures: League of Legends Wild Rift (IL2CPP) https://katyscode.wordpress.com/2021/01/15/reverse-engineering-adventures-league-of-legends-wild-rift-il2cpp/
Adventures in code and reverse engineering
Reverse Engineering Adventures: League of Legends Wild Rift (IL2CPP)
The most common issue I receive on the tracker for Il2CppInspector is “this file won’t load”. Oftentimes this is due to a bug in the tool, but sometimes it leads me down a reverse…
Forwarded from Ralf Hacker Channel (Ralf Hacker)
FontOnLake (Eset - 2021).pdf
652.5 KB