Skip content

11 13 13 results

Filter by

  • Fun with Windows binaries - application whitelist bypass using...

    We were inspired by the work @subTee has done with application whitelisting.  Consequently, we decided to have a hunt around for legitimate...

    Read more
  • Malware Manual Unpacking - [Custom + UPX]

    Implementing all sort of methods to bypass anti-virus (AV) scanners and/or to make the analysis of a malware...

    Read more
  • Windows Inline Function Hooking

    Hooking can be used by legitimate software for reverse engineering, for example, to examine the user mode function...

    Read more

Error

Error

No results found

No results found that match your query

Loading results