reversingdartaotsnapshots-cryptax2024

2024-11-05

Reversing Dart AOT snapshots

by cryptax

Phrack Magazine issue 71, article 11

https://phrack.org/issues/71/11.html

Remark ...
Read More

C-then-asm shellcoding approach

2024-11-04

The C-then-asm shellcoding approach refers to writing shellcode in C first, then converted into assembly language (eg: with gcc -S).

The advantages of ...

Read More

code cave

2024-11-04

A code cave is a sequence of unused or uninitialized bytes within a program’s executable file or memory space. These regions can be used to ...

Read More

EDR evasion

2024-11-04

EDR evasion refers to a series of techniques used to bypass the protections and visibility provided by EDR systems.

Read More

VXadventure-amethystbasilisk2024

2024-11-04

Broodsac A VX Adventure in Build Systems and Oldchool Techniques

by Amethyst Basilisk

Phrack Magazine Issue 71 article 9 ...

Read More

country

2024-11-03

A country is a territorial body or political entity recognized as an independent nation.

Read More

entry point

2024-11-03

The entry point of an executable file is the memory address where execution begins when the program is loaded.

Read More

executable file

2024-11-03

an executable file is a binary file containing machine code instructions for a computer to run a program. These are often formatted as ELF, PE, ...

Read More

grugq

2024-11-03

The grugq is a South African security researcher and hacker with works focusing on OPSEC and digital forensics.

Read More

objcopy

2024-11-03

objcopy is a tool that uses the GNU BFD library that is used to modify several binary formats: ELF, COFF, a.out, PE, SREC, …

It can copy data ...

Read More