- [06-18-2023] DLL Injection: Manual Mapping (5/5)
- [06-18-2023] DLL Injection: Thread Context Hijacking (4/5)
- [06-18-2023] DLL Injection: Remote Threads (3/5)
- [06-18-2023] DLL Injection: Windows Hooks (2/5)
- [06-18-2023] DLL Injection: Background & DLL Proxying (1/5)
- [05-25-2023] Function Hooking: Export Address Table Hooks (7/7)
- [05-25-2023] Function Hooking: Import Address Table Hooks (6/7)
- [05-25-2023] Function Hooking: Virtual Table Hooks (5/7)
- [05-25-2023] Function Hooking: Software Breakpoints (4/7)
- [05-25-2023] Function Hooking: Hardware Breakpoints (3/7)
- [05-25-2023] Function Hooking: Trampolines & Detours (2/7)
- [05-25-2023] Function Hooking: Inline Hooks (1/7)
- [10-17-2022] TED: The Tiny Exfiltrating Debugger
- [08-01-2022] Creating an ESP: Conclusion (4/4)
- [08-01-2022] Creating an ESP: Drawing (3/4)
- [08-01-2022] Creating an ESP: World To Screen (2/4)
- [08-01-2022] Creating an ESP: Introduction (1/4)
- [07-05-2022] Creating an Aimbot: Conclusion (4/4)
- [07-05-2022] Creating an Aimbot: Building the Aimbot (3/4)
- [07-05-2022] Creating an Aimbot: Reverse Engineering & Source SDK (2/4)
- [07-05-2022] Creating an Aimbot: Introduction (1/4)
- [06-27-2022] Vandelay: An Importer/Exporter for BigTable
- [12-01-2021] Reverse Engineering REST APIs: Conclusion (12/12)
- [12-01-2021] Reverse Engineering REST APIs: Ingress – Monitoring (11/12)
- [11-30-2021] Reverse Engineering REST APIs: Ingress – Reversing the Response Decrypt Function (10/12)
- [11-29-2021] Reverse Engineering REST APIs: Ingress – Walking the Call Stack (9/12)
- [11-24-2021] Reverse Engineering REST APIs: Egress – Monitoring (8/12)
- [11-23-2021] Reverse Engineering REST APIs: Egress – Reversing the Request Encrypt Function (7/12)
- [11-22-2021] Reverse Engineering REST APIs: Egress – Walking the Call Stack (6/12)
- [11-19-2021] Reverse Engineering REST APIs: Hooking Winsock (5/12)
- [11-18-2021] Reverse Engineering REST APIs: Debugging (4/12)
- [11-18-2021] Reverse Engineering REST APIs: Basics (3/12)
- [11-17-2021] Reverse Engineering REST APIs: The Easy Way (2/12)
- [11-17-2021] Reverse Engineering REST APIs: Introduction (1/12)
- [10-06-2021] Making a Discord Chat Bot using Markov Chains (2/2)
- [10-06-2021] Making a Discord Chat Bot using Markov Chains (1/2)
- [05-18-2021] Creating a multi-language compiler system: System Setup (11/11)
- [05-18-2021] Creating a multi-language compiler system: Conclusion (10/11)
- [05-18-2021] Creating a multi-language compiler system: Demo (9/11)
- [05-18-2021] Creating a multi-language compiler system: Kubernetes (8/11)
- [05-18-2021] Creating a multi-language compiler system: Containerization (7/11)
- [05-18-2021] Creating a multi-language compiler system: Execution Engine (6/11)
- [05-18-2021] Creating a multi-language compiler system: File Watcher, Bash (5/11)
- [05-18-2021] Creating a multi-language compiler system: File Watcher, C++ (4/11)
- [05-18-2021] Creating a multi-language compiler system: The inotify API (3/11)
- [05-18-2021] Creating a multi-language compiler system: Goals and Architecture (2/11)
- [05-18-2021] Creating a multi-language compiler system: Introduction (1/11)
- [03-11-2017] Game Hacking (3/3): Putting Everything Together
- [02-25-2017] Game Hacking (2/3): The Easy Way
- [02-19-2017] Game Hacking (1/3): The Hard Way
- [12-23-2015] Heap Tracking
- [12-14-2015] Runtime DirectX Hooking
- [09-09-2015] Hekate: x86/x64 Winsock Inspection/Modification (Alpha dev release)
- [08-20-2015] Manually Enumerating Process Modules
- [08-12-2015] Stealth Techniques: Hiding Files in the Registry
- [07-23-2015] Common Types of Disassemblers
- [07-08-2015] Code Snippet: Safe Objects
- [06-15-2015] Syscall Hooking Under WoW64: Implementation (2/2)
- [06-05-2015] Syscall Hooking Under WoW64: Introduction (1/2)
- [05-17-2015] Nop Hopping: Hiding Functionality in Alignment
- [05-10-2015] Debugging Injected DLLs
- [04-24-2015] Code Snippets: FindWindowLike
- [04-16-2015] Everything up on Github
- [04-13-2015] Reverse Engineering Vectored Exception Handlers: Implementation (3/3)
- [04-11-2015] Reverse Engineering Vectored Exception Handlers: Functionality (2/3)
- [04-08-2015] Reverse Engineering Vectored Exception Handlers: Structures (1/3)
- [04-04-2015] Hiding Functionality with Exception Handlers (2/2)
- [04-03-2015] Hiding Functionality with Exception Handlers (1/2)
- [03-28-2015] Thoughts on Modern C++
- [03-26-2015] Malware Techniques: Code Streaming
- [01-15-2015] Virtual Method Table (VMT) Hooking
- [12-20-2014] Writing a Primitive Debugger: Part 5 (Miscellaneous)
- [12-11-2014] Writing a Primitive Debugger: Part 4 (Symbols)
- [12-05-2014] Writing a Primitive Debugger: Part 3 (Call Stack, Registers, Contexts)
- [12-04-2014] Twitter Time
- [12-02-2014] Writing a Primitive Debugger: Part 2 (Breakpoints/Stepping)
- [11-27-2014] Writing a Primitive Debugger: Part 1 (Basics)
- [06-10-2014] Monitoring APIs with RPC and Protocol Buffers
- [05-04-2014] An Experiment In Performing Remote Calls on x64
- [05-02-2014] Messing with MSN Internet Games (2/2)
- [04-30-2014] Updated Email
- [04-30-2014] Messing with MSN Internet Games (1/2)
- [04-22-2014] C++11-style Observer
- [12-06-2013] Calling Undocumented APIs in the Windows Kernel
- [07-23-2011] Upcoming Plans
- [07-23-2011] Messing with Protocols: Applications (3/3)
- [06-01-2011] Messing with Protocols: Reverse Engineering (2/3)
- [05-27-2011] Messing with Protocols: Preliminary (1/3)
- [05-26-2011] Quick Post: Auto-updating with Signature Scanning
- [04-23-2011] Writing a File Infector/Encrypter: Full Source Code and Remarks (4/4)
- [04-23-2011] Writing a File Infector/Encrypter: Writing the Compiled Stub (3/4)
- [04-23-2011] Writing a File Infector/Encrypter: PE File Modification/Section Injection (2/4)
- [04-23-2011] Writing a File Infector/Encrypter: Background (1/4)
- [04-17-2011] Extending External Window Functionality
- [03-25-2011] Follow-up: Memory Breakpoints
- [03-21-2011] Hardware Breakpoints and Structured/Vectored Exception Handling
- [02-21-2011] API Hooking Through Near Call Replacement
- [02-14-2011] Running a (32-bit) Process in the Context of Another
- [02-04-2011] Game Hacking: Age of Empires II (Part 2/?)
- [02-01-2011] Game Hacking: Age of Empires II (Part 1/?)
- [01-23-2011] Steganography with Magic Squares
- [01-14-2011] Five Minute Cracking: Hardcoded Expirations
- [01-13-2011] Analyzing An Application Challenge
- [01-06-2011] Reversing (Undocumented) Windows API Functions
- [01-06-2011] The Beginning…
May 26, 2023
All Posts
Comments Off on All Posts
No Comments
No comments yet.
RSS feed for comments on this post.
Sorry, the comment form is closed at this time.