Exploits Explained, Exploit Kits (Part 3)
Discover exploitation methods, exploits development and inner workings and learn about the countermeasures that exists to protect your infrastructure.
Discover exploitation methods, exploits development and inner workings and learn about the countermeasures that exists to protect your infrastructure.
Adlice PEViewer is a PE parsing tool helping you in your everyday malware analysis and debugging. Learn how it works and how amazing it can be.
RunPE: How to hide code behind a legit process – RunPE is a trick used by some malware to hide code into a legit process. Learn how to detect.
Writing and Analysis of a portable executable (PE) infector. Educational tutorial on how to write your own PE infector that remains hidden in the system.
Learn how to modify a portable executable (pe) file to strip all the junk code and keep only the strict minimal bytes to keep it perfectly functional.