Tools and techniques for analyzing, reverse-engineering, and understanding malicious software. Task: EvasionExplore 2 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32