Rezultati pretraživanja
  1. 28. stu 2019.

    Deep dive analysis of Emotet - Includes breakdown of how the malware generates its filename using the volume serial number of the infected machine and a list of of pre-configured strings.

  2. 17. ožu 2019.

    When learning windows shellcoding, I didn't find a single blog which properly explains how to and why to find the base address of kernel32.dll. A detailed blogpost will be posted tomorrow on this. Wrote almost a 15 page draft.

  3. 5. pro 2019.

    Solution for 5th level for Flare-On 2019 is online - demo. Might be the craziest solutions for all the available 📺

  4. 24. pro 2018.

    Good thing reminded me that it’s Christmas Eve

  5. 25. lip 2019.
  6. 2. tra 2019.

    Chetan Nayak () is back with new blog on Windows Shellcoding at .

  7. 14. tra 2019.

    Spent a whole day differentiating kernel32.dll and ntdll.dll starting from WinXp, 7, Vista, 8 to 10 in and on how to build single shellcode to work across all NT Systems. Revelations😍 Next is differentiating the DEP/ASLR/SEH of different versions for !

  8. 1. velj

    My solution for MugatuWare from Flare-On 2019 is out 📺 👉 With a special thank you to

  9. 18. ožu 2019.

    Read this super awesome and n00b-friendly post on Windows Shellcoding by my buddy Chetan Nayak () on

  10. 6. stu 2019.
  11. 18. lip 2019.

    Wondering if can be run inside

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.