Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @_can1357
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_can1357
-
Can Bölük proslijedio/la je Tweet
BattlEye, a popular anti-cheat, has been detecting unknown cheats by using heuristics in combination with the x86 trap flag. This was done to specifically target "The Perfect Injector" by
@_can1357 from usermode. https://vmcall.blog/battleye-kernel-single-step/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I've received this question a lot so wanted to clarify. Do not use Windbg to debug this project, it will not work due to the internals of ByePg. VMWare GDB stub or any other hypervisor will work fine.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
After an additional week of work, ExHook is finally live. ExHook is a standalone project utilizing ByePgLib allowing you to hook all kernel-to-user exits (SYSCALL or any interrupt) bypassing PatchGuard. Enjoy! https://github.com/can1357/ByePg/tree/master/ExHook …pic.twitter.com/Ta89mG2uHR
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just pushed a SEH module to ByePg, letting you use SEH in manual mapped drivers effectively bypassing another PatchGuard protected mechanism as it protects PsInvertedFunctionTable. System-call hooks coming Soon™. https://github.com/can1357/ByePg/tree/master/FreeSeh …pic.twitter.com/oyFqRMvsuX
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just published my latest project "ByePg", exposing an entirely new attack surface to PatchGuard/NT and bringing
@nickeverdox's InfinityHook back:https://blog.can.ac/2019/10/19/byepg-defeating-patchguard-using-exception-hooking/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbitrary Code Execution At Ring 0 Using CVE-2018-8897:https://blog.can.ac/2018/05/11/arbitrary-code-execution-at-ring-0-using-cve-2018-8897/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.