Home

minister Tragic seară easyhook iat table total saltea Centru

API hooking with Microsoft detours | Infosec Resources
API hooking with Microsoft detours | Infosec Resources

API hooking with Microsoft detours | Infosec Resources
API hooking with Microsoft detours | Infosec Resources

Captain Hook Pirating AVs to Bypass Exploit Mitigations
Captain Hook Pirating AVs to Bypass Exploit Mitigations

Перехват функций (хуки) под Windows в приложениях с помощью C/C++
Перехват функций (хуки) под Windows в приложениях с помощью C/C++

Diverting functions in Windows with IAT patching | Yet Another [à compléter]
Diverting functions in Windows with IAT patching | Yet Another [à compléter]

GitHub - cubiclesoft/php-winpefile: Windows Portable Executable file format  command-line tools and PHP classes. Easily extract structures and  information, modify files, and even construct files from scratch in the  Windows Portable Executable (PE)
GitHub - cubiclesoft/php-winpefile: Windows Portable Executable file format command-line tools and PHP classes. Easily extract structures and information, modify files, and even construct files from scratch in the Windows Portable Executable (PE)

bpmtk: Spying on IE | Didier Stevens
bpmtk: Spying on IE | Didier Stevens

Captain Hook
Captain Hook

Getting to the root of the problem: A detailed comparison of kernel and  user level data for dynamic malware analysis - ScienceDirect
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis - ScienceDirect

Kyle Halladay - X64 Function Hooking by Example
Kyle Halladay - X64 Function Hooking by Example

API hooking with Microsoft detours | Infosec Resources
API hooking with Microsoft detours | Infosec Resources

Piratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigation

PDF) A Survey on Function and System Call Hooking Approaches
PDF) A Survey on Function and System Call Hooking Approaches

bpmtk: Spying on IE | Didier Stevens
bpmtk: Spying on IE | Didier Stevens

Win32 - CodeProject
Win32 - CodeProject

Module Exploring..
Module Exploring..

Diverting functions in Windows with IAT patching | Yet Another [à compléter]
Diverting functions in Windows with IAT patching | Yet Another [à compléter]

Module Exploring..
Module Exploring..

API hooking with Microsoft detours | Infosec Resources
API hooking with Microsoft detours | Infosec Resources

Getting to the root of the problem: A detailed comparison of kernel and  user level data for dynamic malware analysis - ScienceDirect
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis - ScienceDirect

API hooking with Microsoft detours | Infosec Resources
API hooking with Microsoft detours | Infosec Resources

Memory Forensics: Rootkits - Malware Analyst's Cookbook and DVD: Tools and  Techniques for Fighting Malicious Code (2011)
Memory Forensics: Rootkits - Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (2011)

Getting to the root of the problem: A detailed comparison of kernel and  user level data for dynamic malware analysis - ScienceDirect
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis - ScienceDirect

Getting to the root of the problem: A detailed comparison of kernel and  user level data for dynamic malware analysis - ScienceDirect
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis - ScienceDirect

Diverting functions in Windows with IAT patching | Yet Another [à compléter]
Diverting functions in Windows with IAT patching | Yet Another [à compléter]