I am showing an alternative approach to embedding your payload. In this method, the focus will be on stealth as we override a legitimate function
Category: Reverse Engineering
Opaque Predicates Jump is the dead codes
Hi Fellow reverser Playing around with the code reversing, I am sharing a small review on the topic related to obfuscation Code obfuscation is like
APC Injection (Asynchronous Procedure Calls)
Today, I am giving a small tutorial which will discuss about APC (Asynchronous Procedur Calls). The reason that I sharing this tutorial is due to
Basic Hijacking Local Thread
Hi Guys Today, I will be sharing fundamental concepts malware development. This session will focus on the elementary aspects of executing a malicious payload with
Reverse, Enumerate Windows API
I would like to share a basic tutorial on reverse engineering related to Windows API calls. This tutorial will involve reviewing a substantial amount of
Forensic on Victim of CVE-2023-38146 and CVE-2023-28252
Just to continue from my previous post, I conducted an exercise involving the exploitation of a host specifically designed to contain two vulnerabilities: CVE-2023-38146 and