unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Shellcode: Obfuscation with Permutations
Table Of Contents Introduction Affine Transformation Linear Congruential Gener...
2024-10-19 01:15:4 | 阅读: 6 |
收藏
|
modexp - modexp.wordpress.com
affine
lcg
indices
permuted
icg
Shellcode: Windows on ARM64 / AArch64
IntroductionBack in October 2018, I wanted to write ARM assembly on Windows. All I could a...
2024-9-16 22:32:33 | 阅读: 11 |
收藏
|
modexp - modexp.wordpress.com
tbl
x4
dq
windows
pstream
Shellcode: API Hashing with Block Ciphers (Maru4)
IntroductionConstructing your own hash algorithm is controversial because there will alway...
2024-9-2 00:55:1 | 阅读: 17 |
收藏
|
modexp - modexp.wordpress.com
w256
ror64
donut
w128
speck
Shellcode: RSA (Data Masking 4)
Shellcode: RSA (Data Masking 4)IntroductionMalware like Ocea...
2024-8-31 23:6:3 | 阅读: 10 |
收藏
|
modexp - modexp.wordpress.com
masked
unmasked
sympy
involutive
exponent
Shellcode: Pseudo-Random Involution (Data Masking 3)
Shellcode: Pseudo-Random Involution (Data Masking 3)Introducti...
2024-8-31 02:47:54 | 阅读: 7 |
收藏
|
modexp - modexp.wordpress.com
involution
eb
9d
masking
c6
Shellcode: Modular Exponentiation for Diffie-Hellman Key Exchange.
Table Of Contents Introduction Symmetric vs Asymmetric Encryption...
2024-7-22 06:6:3 | 阅读: 24 |
收藏
|
modexp - modexp.wordpress.com
bn
alice
exchange
modexp
diffie
Shellcode: Data Masking 2
Shellcode: Data Masking 2IntroductionThis is a quick follo...
2024-4-29 16:8:21 | 阅读: 31 |
收藏
|
modexp - modexp.wordpress.com
sbox
shuffle
ciphers
inv
Delegated NT DLL
Delegated NT DLLIntroductionredplait and Adam/Hexacorn alr...
2024-2-14 04:30:0 | 阅读: 10 |
收藏
|
modexp - modexp.wordpress.com
windows
memory
wow64
redplait
rdata
WOW64 Callback Table (FinFisher)
WOW64 Callback Table (FinFisher)IntroductionKen Johnson (o...
2023-4-20 02:7:51 | 阅读: 14 |
收藏
|
modexp - modexp.wordpress.com
wow64
mbi
finfisher
Shellcode: Entropy Reduction With Base-32 Encoding.
IntroductionCompressed, encrypted, and random data all contain a high amount of entropy,...
2023-4-7 19:57:17 | 阅读: 34 |
收藏
|
modexp - modexp.wordpress.com
outlen
inbuf
outbuf
entropy
wl
How Red Teams Bypass AMSI and WLDP for .NET Dynamic Code | modexp
IntroductionPrevious ResearchAMSI Example in CAMSI ContextAMSI InitializationAMSI Scann...
2022-10-8 01:56:50 | 阅读: 2 |
收藏
|
modexp.wordpress.com
amsicontext
wldp
How Red Teams Bypass AMSI and WLDP for .NET Dynamic Code | modexp
IntroductionPrevious ResearchAMSI Example in CAMSI ContextAMSI InitializationAMSI Scann...
2022-10-8 01:55:10 | 阅读: 29 |
收藏
|
modexp.wordpress.com
amsicontext
bypass
wldp
Shellcode: Base-N Decoding for Text-Only Compression and Obfuscation
IntroductionConcise Binary Object Representation (CBOR), the binary equivalent to JavaScri...
2022-8-22 09:0:0 | 阅读: 33 |
收藏
|
modexp.wordpress.com
bn
pwr
tbl
bignum
compress
Shellcode: Data Masking
IntroductionThere are more than four ways to mask data, but these are the main ones to foc...
2022-7-31 08:1:53 | 阅读: 87 |
收藏
|
modexp.wordpress.com
shuffling
prng
shuffle
inlen
inbuf
Shellcode: Linux on RISC-V 64-Bit
RISC-V (pronounced “risk-five” ) is an open standard instruction set architecture (ISA) based...
2022-5-3 04:28:59 | 阅读: 55 |
收藏
|
modexp.wordpress.com
ecall
a7
risc
fileno
dup3
Windows Data Structures and Callbacks, Part 1
Windows Data Structures and Callbacks, Part 1ContentsIntroductionFunction Table ListEven...
2020-08-07 05:20:02 | 阅读: 119 |
收藏
|
modexp.wordpress.com
wer
memory
pwer
kernelbase
vectored
Windows Process Injection: Command Line and Environment Variables
Windows Process Injection: Command Line and Environment VariablesContentsIntroductionShel...
2020-07-31 13:00:38 | 阅读: 75 |
收藏
|
modexp.wordpress.com
shellcode
stk
ecw
pwchar
startupinfo
Windows Process Injection: EM_GETHANDLE, WM_PASTE and EM_SETWORDBREAKPROC
IntroductionEdit ControlsWriting CP-1252 Compatible CodeInitializationSet RAX to 0Set...
2020-07-07 09:30:46 | 阅读: 48 |
收藏
|
modexp.wordpress.com
x6a
shellcode
cf
em
memory
Shellcode: Encoding Null Bytes Faster With Escape Sequences
IntroductionQuick post about a common problem removing null bytes in the loader generated by...
2020-06-26 18:00:49 | 阅读: 41 |
收藏
|
modexp.wordpress.com
keylen
nullz
shellcode
memory
putc
Invoking System Calls and Windows Debugger Engine
IntroductionQuick post about Windows System calls that I forgot about working on after the...
2020-06-02 00:00:53 | 阅读: 48 |
收藏
|
modexp.wordpress.com
ofs
lde
rva2ofs
ulong64
memory
Previous
-49
-48
-47
-46
-45
-44
-43
-42
Next