SecTemple: hacking, threat hunting, pentesting y Ciberseguridad
▼
Showing posts with label shellcode. Show all posts
Showing posts with label shellcode. Show all posts

Anatomy of Nim Shellcode: Bypassing Antivirus with Windows API Exploitation

›
The digital shadows whisper tales of intrusion. In the hushed corners of the network, operators craft their tools, each line of code a cal...

CyberChef Deep Dive: Automating Shellcode Extraction from PowerShell Loaders

›
The flickering neon sign of the city cast long, distorted shadows across my terminal. Another night, another piece of malware whispering it...

Anatomy of AV Evasion: Mastering Shellcode Obfuscation with Packers

›
The digital shadows stretch long in the early hours, and the fluorescent hum of the server rack is your only confessor. You're stari...

Anatomía de un Desbordamiento de Búfer (BoF) y Shellcode: Défensa y Mitigación

›
La luz parpadeante del monitor era la única compañía mientras los logs del servidor escupían una anomalía. Una que no debería estar ahí. U...

Understanding Exploit, Payload, and Shellcode: A Hacker's Perspective

›
The digital shadows are deep, and the whispers of compromised systems echo through the network. For those who walk the wire, the termin...

Mastering Buffer Overflows: A Deep Dive for the Modern Exploit Developer

›
The digital shadows are long, and in their depths, vulnerabilities lie dormant, waiting for a whisper to awaken them. Buffer overflows are...
›
Home
View web version
Powered by Blogger.