Category: Blog

Your blog category


  • Process Injection Part III

  • From BYOVD to Full System Exploitation

  • AV & EDR Hooking Evasion

  • Windows Protected Process Light Part 1

  • RPC for Malware Development

  • APC Injection and Shellcode Execution

  • Windows Credential Dumping Techniques

  • Process Injection Part II

  • Building Command and Control Server based in Tor Part II

  • Introduction to Android Malware Development