🤔 Ah, the groundbreaking idea of cramming multiple #executables into one address space—because nothing says "innovation" like turning your system into a roommate sitcom where nobody pays rent! 🚀 Meanwhile, #GitHub continues to dazzle us with buzzwords like "threadprocs" and "0-copy pointers," proving once again that tech jargon is the ultimate substitute for an actual plot. 🧐
https://github.com/jer-irl/threadprocs #innovation #techjargon #softwaredevelopment #HackerNews #ngated
GitHub - jer-irl/threadprocs: Experimental thread-like processes, multiple executables in one address space

Experimental thread-like processes, multiple executables in one address space - jer-irl/threadprocs

GitHub

Threadprocs – executables sharing one address space (0-copy pointers)

https://github.com/jer-irl/threadprocs

#HackerNews #Threadprocs #Executables #0-Copy #Pointers #Address #Space #GitHub

CP/M, DOS и их .COMманды

Небольшое предупреждение! Я буду говорить не просто о том "Как запускаются комманды?", а покажу часть внутреннего мира операционных систем и покажу принципиальную разницу в их работе. Это моя первая статья, вырванная из дневника, который я веду пока что закрыто, особо не выкладывая заметки в публичный доступ.

https://habr.com/ru/articles/938640/

#dos #msdos #cpm #intel #com #command #commands #executables #binary

CP/M, DOS и их .COMманды

Вступление Небольшое предупреждение! Субъективно, эта статья содержанием немного не удовлетворяет смыслу переданному в заголовке. Я буду говорить не просто о том "Как запускаются команды?", а покажу...

Хабр
Building Statically Linked Go Executables with CGO and Zig - Jim Calabro

Jim Calabro

Delving deeper into memory manipulation reveals a sophisticated array of file-based process tampering techniques. From self-deleting #executables to the elusive #ProcessGhosting, #Doppelganging, and #Herpaderping attackers employ a variety of methods to obscure their activities and evade detection. Understanding them is important for defenders seeking to improve their cybersecurity defenses.

[4/6]

New blog post!

Dive into the complexities of collecting samples for #malware analysis with our latest article where we suggest an innovative forensic approach for dumping #executables on Windows. From evasion techniques to transient file interactions, we explore the challenges faced by defenders.

Discover the #limitations of the current methodologies and explore our alternative solution that bypasses the need to collect files or parse attacker-controlled memory.

[1/6]

#Python scripts to Portable #Executables (PE) for #Windows such as #Pyinstaller or #Py2exe are instantly seen as suspicious and sometimes immediately detected as #malware regardless of context.
Snatch Team Steals Data and Hammers Orgs with Ransomware - Snatch has burst on the scene, featuring an array of executables and tools for carrying out carefu... more: https://threatpost.com/snatch-team-infiltrates-steals-data-ransomware/150974/ #informationstealing #malwareanalysis #executables #ransomware #snatchteam #malware #snatch #sophos
Snatch Team Steals Data and Hammers Orgs with Ransomware

Snatch has burst on the scene, featuring an array of executables and tools for carrying out carefully orchestrated attacks.

Threatpost - English - Global - threatpost.com