ByteShield
1.29K subscribers
99 photos
32 videos
107 files
519 links
Download Telegram
👍1
An unexpected journey into Microsoft Defender's signature World


https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world
UPX Unpacking: Manual Reverse Engineering

Master the full process of analyzing packed PE files: setting hardware breakpoints on the stack, locating the tail jump and fixing the Import Address Table

https://guidedhacking.com/threads/how-to-unpack-upx-using-x64dbg.20985/
ARM64 Reversing And Exploitation Part 4 – Using mprotect() to bypass NX Protection


https://8ksec.io/arm64-reversing-and-exploitation-part-4-using-mprotect-to-bypass-nx-protection-8ksec-blogs/
ARM64 Reversing And Exploitation Part 5 – Writing Shellcode

https://8ksec.io/arm64-reversing-and-exploitation-part-5-writing-shellcode-8ksec-blogs/