NoSociety.de

#nosoc

  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In

Search

You can find the results of your search below.

Contains
  • Exact match
  • Starts with
  • Ends with
  • Contains
@en:it-security:blog
  • Any namespace
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Fulltext results:

Shellcode Injection Part 4
8 Hits, Last modified: 13 months ago
, rax ; Adress_Table mov [rbp - 18h], rax ; Name_Ptr_Table mov [rbp - 20h], rax ; Ordinal_Table... ddress_Table RVA_Export_Table + 0x20 Bytes -> RVA_Name_Pointer_Table RVA_Export_Table + 0x24 Bytes -> RV... dress_Table -> Var mov ecx, [rax + 0x20] ; RVA_Name_Ptr_Table add rcx, rbx ; Name_Ptr_Table = kernel32.base + RVA_Name_Ptr_Table mov [rbp - 18h
Buffer overflow in the 64-bit stack - part 1
2 Hits, Last modified: 14 months ago
"Usage: %s <environment variable> <target program name>\n", argv[0]); exit(0); } ptr = getenv(argv[1... v[0]) - strlen(argv[2]))*2; /* adjust for program name */ printf("%s will be at %p\n", argv[1], ptr); }
Obfuscation: polymorphic in-memory decoder
1 Hits, Last modified: 11 months ago
, as only the corresponding registers had to be renamed. The decoder starts with this instruction: <cod
Shellcode Injection Part 2
1 Hits, Last modified: 14 months ago
which is [[https://www.bordergate.co.uk/function-name-hashing/|in this interesting blog post]] is expla
Shellcode Injection Part 3
1 Hits, Last modified: 15 months ago
s> ;Zeile 143 / +7 marks the beginning of the filename (WindowsAgent.py) lea edx, [esi + 7] ;Zeile 184