• Security tools
    • Glyptodon
      • Suggestions
      • Download
  • Links
  • Learning security
    • The human factor
    • Operating Systems
      • Windows
        • Code injection series
      • GNU Linux
    • Networks
      • Local Area Network
      • Firewalls, IDS, IPS
    • Malwares
    • Applications
      • Web applications
      • Java
  • Exploits
  • About us
  • Code Injection - Disable Dynamic Code Mitigation (ACG)

    How to disable Dynamic Code Mitigation Policy (ACG) to be able to inject code and deploy hooks into Microsoft Edge and others Continue reading →

    D 1 December 2019     A Emeric Nasi     C 0 messages

1 | 2 | 3

  • Code Injection - Exploit WNF callback

    In this post I am going to take the WNF code injection method described in https://modexp.wordpress.com/2019/06/15/4083/, and generalize it to execute remote code that was...
    Continue reading →
    D 1 December 2019     A Emeric Nasi     C 0 messages
  • Code Injection - Bypass start address protection

    Over the year several mechanisms were developed by vendors to prevent code injection. A common mechanism is to detect invalid start address of the injected thread. Here, as an...
    Continue reading →
    D 5 September 2019     A Emeric Nasi     C 0 messages
  • Code Injection - Process PE Injection Basics

    In this first part of the injection series, I am presenting how to inject and run code in a target process on Windows using the method called PE injection. This method allows...
    Continue reading →
    D 1 September 2019     A Emeric Nasi     C 0 messages

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | ... | 18

Search


Most popular

1.  PE injection explained

2.  Fun combining anti-debugging and anti-disassembly tricks

3.  VNC to access Kali Linux on Raspberry Pi

4.  Hacking around HTA files

5.  Modify any Java class field using reflection.


5 random articles

1.  Bluffing Network Scan Tools

2.  VNC to access Kali Linux on Raspberry Pi

3.  Javascript -Java compatible encryption

4.  Code Injection - Exploit WNF callback

5.  PE injection explained


Sponsor

If you appreciate my work, you may help or reward with a contribution :)

  • ->  Paypal donation

Most recent articles
  • 1 December – Code Injection - Disable Dynamic Code Mitigation (ACG)
  • 1 December – Code Injection - Exploit WNF callback
  • 5 September – Code Injection - Bypass start address protection
  • 1 September – Code Injection - Process PE Injection Basics
  • 24 February – Bypass Windows Defender Attack Surface Reduction
  • 23 January – Yet another sdclt UAC bypass
  • 23 June 2018 – Advanced USB key phishing
  • 7 February 2018 – Hacking around HTA files

1 | 2 | 3 | 4 | 5

Recent comments
  • September 2018, cool :
    « Nice work! :) Nice 4 sharing! »
  • August 2018, Alexandre :
    « Hello, very interesting article. Congratulations. I would like to know if (...) »
  • June 2018, Vinicius :
    « Awsome article. Just a question. Is not clear for me the flag limit-burst, (...) »
  • April 2018, Kody :
    « #touch /.Xresources restart service #rm -rf /.Xauthority restart service (...) »

1 | 2 | 3 | 4 | 5

Latest news
Tweets by EmericNasi

2010-2019 Sevagas
Archives | Log in | Contact

RSS 2.0 twitter linkedin facebook