unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Course Review - HackTheBox Bug Bounty Hunter
Hi there!Today I bring you a review of a the Bug Bounty Hunter course offered by HackTheBox (HTB), w...
2024-11-20 08:0:0 | 阅读: 0 |
收藏
|
D3Ext - d3ext.github.io
htb
opinion
obviously
cubes
Malware Development 17 - Introduction to offensive Nim
Hi there!Some days back I thought about learning a new language that could was powerful, lightweight...
2024-10-5 08:0:0 | 阅读: 17 |
收藏
|
D3Ext - d3ext.github.io
nim
shellcode
github
0x8b
windows
Malware Development 16 - Process Hollowing (Golang)
Hi there!After almost one year since last post, today we will be discussing a well-known technique u...
2024-10-1 08:0:0 | 阅读: 9 |
收藏
|
D3Ext - d3ext.github.io
0x8b
shellcode
windows
newproc
Malware Development 15 - Using Hooka and Maldev for Malware Dev (Golang)
Hi there!This post is definitely much more special for me since today we’ll use two different tools/...
2023-10-13 08:0:0 | 阅读: 53 |
收藏
|
D3Ext - d3ext.github.io
shellcode
hooka
github
d3ext
windows
Malware Development 14 - UAC bypass privilege escalation (Golang)
Hi hackers!In this posts we’ll see how threat actors can approach default Windows misconfigurations...
2023-9-16 08:0:0 | 阅读: 10 |
收藏
|
D3Ext - d3ext.github.io
windows
fodhelper
bypass
software
sei
Malware Development 13 - Shellcode injection without VirtualAllocEx RWX (Golang)
Today we’ll see a truly excellent way in which we can perform our shellcode injections to avoid allo...
2023-9-15 08:0:0 | 阅读: 2 |
收藏
|
D3Ext - d3ext.github.io
windows
shellcode
imagebase
Malware Development 12 - Patching Event Tracing for Windows (Golang)
Hello hackers!On this post we’ll see what ETW is, how this affects red teamers, what can we do again...
2023-7-24 08:0:0 | 阅读: 11 |
收藏
|
D3Ext - d3ext.github.io
etw
newproc
github
Malware Development 11 - Privesc via named pipes as Metasploit getsystem (Golang)
Hi hackers!Welcome to the 11º malware development post, today we’ll discuss how Metasploit implement...
2023-7-23 08:0:0 | 阅读: 25 |
收藏
|
D3Ext - d3ext.github.io
windows
client
fatalf
sysprocattr
microsoft
Malware Analysis 2 - All about Yara rules
Hi friends!In this post we will learn how threat hunters use YARA rules to detect potential security...
2023-6-15 08:0:0 | 阅读: 11 |
收藏
|
D3Ext - d3ext.github.io
blackenergy
dropbear
florian
roth
filesize
Previous
-39
-38
-37
-36
-35
-34
-33
-32
Next