#proces #inject #memory #windows
Complete Arsenal of Memory injection and other techniques for red-teaming in Windows
https://github.com/0xDivyanshu/Injector
@securation
Complete Arsenal of Memory injection and other techniques for red-teaming in Windows
https://github.com/0xDivyanshu/Injector
@securation
⭕️ A Memory Visualiser Tool for iOS Security Research
In this post I want to share a recent project of mine — a memory visualiser tool for iOS security researchers.
- Live Memory Monitoring
- Visual Block Creation
- Contextual Typing
https://bellis1000.medium.com/a-memory-visualiser-tool-for-ios-security-research-bd8bb8c334c6
#ios #memory #security
@securation
In this post I want to share a recent project of mine — a memory visualiser tool for iOS security researchers.
- Live Memory Monitoring
- Visual Block Creation
- Contextual Typing
https://bellis1000.medium.com/a-memory-visualiser-tool-for-ios-security-research-bd8bb8c334c6
#ios #memory #security
@securation
👍3👎2🔥2
Emulating File I/O for In-Memory Fuzzing
https://www.signal-labs.com/blog/emulating-fileio-fuzzing
#memory #fuzzing
@securation
https://www.signal-labs.com/blog/emulating-fileio-fuzzing
#memory #fuzzing
@securation
Signal Labs
Emulating File I/O for In-Memory Fuzzing | Advanced Offensive Cybersecurity Training
Using hooks & file I/O emulation to redirect disk I/O operations to memory, removing disk I/O & related syscalls during fuzzing (which also enables using snapshot-fuzzers that don't support disk I/O).
👍1
⭕️ Obfuscating Memory Regions with Timers
https://mez0.cc/posts/vulpes-obfuscating-memory-regions/
#redteam #memory #obfuscation #edr #av #bypass
@securation
https://mez0.cc/posts/vulpes-obfuscating-memory-regions/
#redteam #memory #obfuscation #edr #av #bypass
@securation
👍3