Home

Arashigaoka Obligatoriu suspinând easyhook iat table sunt fericit Recomandat Pivniţă

Windows API Hooking - Hide Process from Task Manager tutorial - YouTube
Windows API Hooking - Hide Process from Task Manager tutorial - YouTube

System portfolio
System portfolio

Diverting functions in Windows with IAT patching | Yet Another [à compléter]
Diverting functions in Windows with IAT patching | Yet Another [à compléter]

Getting to the root of the problem: A detailed comparison of kernel and  user level data for dynamic malware analysis - ScienceDirect
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis - ScienceDirect

PDF) A Survey on Function and System Call Hooking Approaches
PDF) A Survey on Function and System Call Hooking Approaches

Information | Free Full-Text | MANNWARE: A Malware Classification Approach  with a Few Samples Using a Memory Augmented Neural Network
Information | Free Full-Text | MANNWARE: A Malware Classification Approach with a Few Samples Using a Memory Augmented Neural Network

Trampoline and target functions, before and after insertion of the... |  Download Scientific Diagram
Trampoline and target functions, before and after insertion of the... | Download Scientific Diagram

GitHub - timdiels/sysintercept: System call interceptor for windows
GitHub - timdiels/sysintercept: System call interceptor for windows

Captain Hook
Captain Hook

Kyle Halladay - X64 Function Hooking by Example
Kyle Halladay - X64 Function Hooking by Example

Diverting functions in Windows with IAT patching | Yet Another [à compléter]
Diverting functions in Windows with IAT patching | Yet Another [à compléter]

Memory Forensics: Rootkits - Malware Analyst's Cookbook and DVD: Tools and  Techniques for Fighting Malicious Code (2011)
Memory Forensics: Rootkits - Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (2011)

bpmtk: Spying on IE | Didier Stevens
bpmtk: Spying on IE | Didier Stevens

Getting to the root of the problem: A detailed comparison of kernel and  user level data for dynamic malware analysis - ScienceDirect
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis - ScienceDirect

Captain Hook Pirating AVs to Bypass Exploit Mitigations
Captain Hook Pirating AVs to Bypass Exploit Mitigations

API hooking with Microsoft detours | Infosec Resources
API hooking with Microsoft detours | Infosec Resources

Перехват функций (хуки) под Windows в приложениях с помощью C/C++
Перехват функций (хуки) под Windows в приложениях с помощью C/C++

GitHub - cubiclesoft/php-winpefile: Windows Portable Executable file format  command-line tools and PHP classes. Easily extract structures and  information, modify files, and even construct files from scratch in the  Windows Portable Executable (PE)
GitHub - cubiclesoft/php-winpefile: Windows Portable Executable file format command-line tools and PHP classes. Easily extract structures and information, modify files, and even construct files from scratch in the Windows Portable Executable (PE)

Diverting functions in Windows with IAT patching | Yet Another [à compléter]
Diverting functions in Windows with IAT patching | Yet Another [à compléter]

Getting to the root of the problem: A detailed comparison of kernel and  user level data for dynamic malware analysis - ScienceDirect
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis - ScienceDirect

API hooking with Microsoft detours | Infosec Resources
API hooking with Microsoft detours | Infosec Resources

Win32 - CodeProject
Win32 - CodeProject

4 Most Popular API Hooking Libraries [Comparison Guide] | Apriorit
4 Most Popular API Hooking Libraries [Comparison Guide] | Apriorit

Module Exploring..
Module Exploring..