You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
![]() |
2 years ago | |
---|---|---|
Abusing the Windows Power Management API | 3 years ago | |
ChromePasswordDumper | 2 years ago | |
Hells Gate | 3 years ago | |
Identifying Antivirus Software by enumerating Minifilter String Names | 3 years ago | |
Infecting Android Applications The New Way | 3 years ago | |
Node Module Infector | 2 years ago | |
Stealthily Creating Processes | 2 years ago | |
The Persistence Series | 2 years ago | |
USB Propagation | 3 years ago | |
Weaponizing Windows Virtualization | 3 years ago | |
Win64.VirTool.BCDEdit | 2 years ago | |
Wormable SSH | 3 years ago | |
Xaoc | 2 years ago | |
yarhLoader | 2 years ago | |
An Alternative Method To Enumerate Processes.pdf | 3 years ago | |
BlockDlls.b.cpp | 2 years ago | |
From a C project through assembly to shellcode.pdf | 3 years ago | |
GpuMemoryAbuse.cpp | 2 years ago | |
Linux.Proudhon.i386.asm | 3 years ago | |
Mocoh Polymorphic Engine.asm | 3 years ago | |
NtUserGetRawInputDataKeylogger.cpp | 2 years ago | |
The Fake Entry Point Trick.txt | 3 years ago |