RCE Endeavors 😅

May 26, 2023

All Posts

Filed under: — admin @ 8:12 PM
  1. [06-18-2023] DLL Injection: Manual Mapping (5/5)
  2. [06-18-2023] DLL Injection: Thread Context Hijacking (4/5)
  3. [06-18-2023] DLL Injection: Remote Threads (3/5)
  4. [06-18-2023] DLL Injection: Windows Hooks (2/5)
  5. [06-18-2023] DLL Injection: Background & DLL Proxying (1/5)
  6. [05-25-2023] Function Hooking: Export Address Table Hooks (7/7)
  7. [05-25-2023] Function Hooking: Import Address Table Hooks (6/7)
  8. [05-25-2023] Function Hooking: Virtual Table Hooks (5/7)
  9. [05-25-2023] Function Hooking: Software Breakpoints (4/7)
  10. [05-25-2023] Function Hooking: Hardware Breakpoints (3/7)
  11. [05-25-2023] Function Hooking: Trampolines & Detours (2/7)
  12. [05-25-2023] Function Hooking: Inline Hooks (1/7)
  13. [10-17-2022] TED: The Tiny Exfiltrating Debugger
  14. [08-01-2022] Creating an ESP: Conclusion (4/4)
  15. [08-01-2022] Creating an ESP: Drawing (3/4)
  16. [08-01-2022] Creating an ESP: World To Screen (2/4)
  17. [08-01-2022] Creating an ESP: Introduction (1/4)
  18. [07-05-2022] Creating an Aimbot: Conclusion (4/4)
  19. [07-05-2022] Creating an Aimbot: Building the Aimbot (3/4)
  20. [07-05-2022] Creating an Aimbot: Reverse Engineering & Source SDK (2/4)
  21. [07-05-2022] Creating an Aimbot: Introduction (1/4)
  22. [06-27-2022] Vandelay: An Importer/Exporter for BigTable
  23. [12-01-2021] Reverse Engineering REST APIs: Conclusion (12/12)
  24. [12-01-2021] Reverse Engineering REST APIs: Ingress – Monitoring (11/12)
  25. [11-30-2021] Reverse Engineering REST APIs: Ingress – Reversing the Response Decrypt Function (10/12)
  26. [11-29-2021] Reverse Engineering REST APIs: Ingress – Walking the Call Stack (9/12)
  27. [11-24-2021] Reverse Engineering REST APIs: Egress – Monitoring (8/12)
  28. [11-23-2021] Reverse Engineering REST APIs: Egress – Reversing the Request Encrypt Function (7/12)
  29. [11-22-2021] Reverse Engineering REST APIs: Egress – Walking the Call Stack (6/12)
  30. [11-19-2021] Reverse Engineering REST APIs: Hooking Winsock (5/12)
  31. [11-18-2021] Reverse Engineering REST APIs: Debugging (4/12)
  32. [11-18-2021] Reverse Engineering REST APIs: Basics (3/12)
  33. [11-17-2021] Reverse Engineering REST APIs: The Easy Way (2/12)
  34. [11-17-2021] Reverse Engineering REST APIs: Introduction (1/12)
  35. [10-06-2021] Making a Discord Chat Bot using Markov Chains (2/2)
  36. [10-06-2021] Making a Discord Chat Bot using Markov Chains (1/2)
  37. [05-18-2021] Creating a multi-language compiler system: System Setup (11/11)
  38. [05-18-2021] Creating a multi-language compiler system: Conclusion (10/11)
  39. [05-18-2021] Creating a multi-language compiler system: Demo (9/11)
  40. [05-18-2021] Creating a multi-language compiler system: Kubernetes (8/11)
  41. [05-18-2021] Creating a multi-language compiler system: Containerization (7/11)
  42. [05-18-2021] Creating a multi-language compiler system: Execution Engine (6/11)
  43. [05-18-2021] Creating a multi-language compiler system: File Watcher, Bash (5/11)
  44. [05-18-2021] Creating a multi-language compiler system: File Watcher, C++ (4/11)
  45. [05-18-2021] Creating a multi-language compiler system: The inotify API (3/11)
  46. [05-18-2021] Creating a multi-language compiler system: Goals and Architecture (2/11)
  47. [05-18-2021] Creating a multi-language compiler system: Introduction (1/11)
  48. [03-11-2017] Game Hacking (3/3): Putting Everything Together
  49. [02-25-2017] Game Hacking (2/3): The Easy Way
  50. [02-19-2017] Game Hacking (1/3): The Hard Way
  51. [12-23-2015] Heap Tracking
  52. [12-14-2015] Runtime DirectX Hooking
  53. [09-09-2015] Hekate: x86/x64 Winsock Inspection/Modification (Alpha dev release)
  54. [08-20-2015] Manually Enumerating Process Modules
  55. [08-12-2015] Stealth Techniques: Hiding Files in the Registry
  56. [07-23-2015] Common Types of Disassemblers
  57. [07-08-2015] Code Snippet: Safe Objects
  58. [06-15-2015] Syscall Hooking Under WoW64: Implementation (2/2)
  59. [06-05-2015] Syscall Hooking Under WoW64: Introduction (1/2)
  60. [05-17-2015] Nop Hopping: Hiding Functionality in Alignment
  61. [05-10-2015] Debugging Injected DLLs
  62. [04-24-2015] Code Snippets: FindWindowLike
  63. [04-16-2015] Everything up on Github
  64. [04-13-2015] Reverse Engineering Vectored Exception Handlers: Implementation (3/3)
  65. [04-11-2015] Reverse Engineering Vectored Exception Handlers: Functionality (2/3)
  66. [04-08-2015] Reverse Engineering Vectored Exception Handlers: Structures (1/3)
  67. [04-04-2015] Hiding Functionality with Exception Handlers (2/2)
  68. [04-03-2015] Hiding Functionality with Exception Handlers (1/2)
  69. [03-28-2015] Thoughts on Modern C++
  70. [03-26-2015] Malware Techniques: Code Streaming
  71. [01-15-2015] Virtual Method Table (VMT) Hooking
  72. [12-20-2014] Writing a Primitive Debugger: Part 5 (Miscellaneous)
  73. [12-11-2014] Writing a Primitive Debugger: Part 4 (Symbols)
  74. [12-05-2014] Writing a Primitive Debugger: Part 3 (Call Stack, Registers, Contexts)
  75. [12-04-2014] Twitter Time
  76. [12-02-2014] Writing a Primitive Debugger: Part 2 (Breakpoints/Stepping)
  77. [11-27-2014] Writing a Primitive Debugger: Part 1 (Basics)
  78. [06-10-2014] Monitoring APIs with RPC and Protocol Buffers
  79. [05-04-2014] An Experiment In Performing Remote Calls on x64
  80. [05-02-2014] Messing with MSN Internet Games (2/2)
  81. [04-30-2014] Updated Email
  82. [04-30-2014] Messing with MSN Internet Games (1/2)
  83. [04-22-2014] C++11-style Observer
  84. [12-06-2013] Calling Undocumented APIs in the Windows Kernel
  85. [07-23-2011] Upcoming Plans
  86. [07-23-2011] Messing with Protocols: Applications (3/3)
  87. [06-01-2011] Messing with Protocols: Reverse Engineering (2/3)
  88. [05-27-2011] Messing with Protocols: Preliminary (1/3)
  89. [05-26-2011] Quick Post: Auto-updating with Signature Scanning
  90. [04-23-2011] Writing a File Infector/Encrypter: Full Source Code and Remarks (4/4)
  91. [04-23-2011] Writing a File Infector/Encrypter: Writing the Compiled Stub (3/4)
  92. [04-23-2011] Writing a File Infector/Encrypter: PE File Modification/Section Injection (2/4)
  93. [04-23-2011] Writing a File Infector/Encrypter: Background (1/4)
  94. [04-17-2011] Extending External Window Functionality
  95. [03-25-2011] Follow-up: Memory Breakpoints
  96. [03-21-2011] Hardware Breakpoints and Structured/Vectored Exception Handling
  97. [02-21-2011] API Hooking Through Near Call Replacement
  98. [02-14-2011] Running a (32-bit) Process in the Context of Another
  99. [02-04-2011] Game Hacking: Age of Empires II (Part 2/?)
  100. [02-01-2011] Game Hacking: Age of Empires II (Part 1/?)
  101. [01-23-2011] Steganography with Magic Squares
  102. [01-14-2011] Five Minute Cracking: Hardcoded Expirations
  103. [01-13-2011] Analyzing An Application Challenge
  104. [01-06-2011] Reversing (Undocumented) Windows API Functions
  105. [01-06-2011] The Beginning…

No Comments

No comments yet.

RSS feed for comments on this post.

Sorry, the comment form is closed at this time.

Powered by WordPress