https://github.com/jer-irl/threadprocs #innovation #techjargon #softwaredevelopment #HackerNews #ngated
Threadprocs – executables sharing one address space (0-copy pointers)
https://github.com/jer-irl/threadprocs
#HackerNews #Threadprocs #Executables #0-Copy #Pointers #Address #Space #GitHub
GitHub - Faugus/faugus-launcher: A simple and lightweight app for running Windows games using UMU-Launcher Faugus est un launcher de jeu vidéo qui se distingue d'Heroic Games Launcher. En effet, Heroic Games Launcher, Lutris aussi sont associés à vos bibliothèques de jeu. Faugus quant à lui permet de lancer n'importe quel jeu depuis un exécutable. Et c'est ici que ça fait toute la différence. https://news.restez-curieux.ovh/shaare/gUhQVQ
CP/M, DOS и их .COMманды
Небольшое предупреждение! Я буду говорить не просто о том "Как запускаются комманды?", а покажу часть внутреннего мира операционных систем и покажу принципиальную разницу в их работе. Это моя первая статья, вырванная из дневника, который я веду пока что закрыто, особо не выкладывая заметки в публичный доступ.
https://habr.com/ru/articles/938640/
#dos #msdos #cpm #intel #com #command #commands #executables #binary
Building Statically Linked Go Executables with CGO and Zig
#HackerNews #Building #Statically #Linked #Go #Executables #with #CGO #and #Zig #Go #Lang #CGO #Zig #Programming #Tutorial #Statically #Linked #Executables
Delving deeper into memory manipulation reveals a sophisticated array of file-based process tampering techniques. From self-deleting #executables to the elusive #ProcessGhosting, #Doppelganging, and #Herpaderping attackers employ a variety of methods to obscure their activities and evade detection. Understanding them is important for defenders seeking to improve their cybersecurity defenses.
[4/6]
New blog post!
Dive into the complexities of collecting samples for #malware analysis with our latest article where we suggest an innovative forensic approach for dumping #executables on Windows. From evasion techniques to transient file interactions, we explore the challenges faced by defenders.
Discover the #limitations of the current methodologies and explore our alternative solution that bypasses the need to collect files or parse attacker-controlled memory.
[1/6]