Letting go of DIGImend

A blog about all things technology, but mostly computer software and hardware.

Exploiting Reversing (ER) series: article 02 | Windows kernel drivers – part 02

The second article (85 pages) in the Exploiting Reversing (ER) series, a step-by-step vulnerability research series on Windows, macOS, hypervisors and browsers, is available for reading on: (PDF): …

Exploit Reversing

I have to share 2 major resources I have used quite a lot now,

A - one exe - toolkit which includes debuggers, utils, and unpackers! Such a marvelous repo, respect!
- https://github.com/indetectables-net/toolkit

some Malware's inner workings! a list of common things used in malware (like isdebuggerpresent,etc )
- https://github.com/LordNoteworthy/al-khaser

And not to be forgotten - MrExodia's Titanhide!
- https://github.com/mrexodia/TitanHide

and finally
ImHex by WerWolv
- https://github.com/WerWolv/ImHex

#debugging #imhex #titanhide #kernel #kerneldrivers

GitHub - indetectables-net/toolkit: The essential toolkit for reversing, malware analysis, and cracking

The essential toolkit for reversing, malware analysis, and cracking - indetectables-net/toolkit

GitHub
Exploiting Reversing (ER) series: article 02 | Windows kernel drivers – part 02

The second article (85 pages) in the Exploiting Reversing (ER) series, a step-by-step vulnerability research series on Windows, macOS, hypervisors and browsers, is available for reading on: (PDF): …

Exploit Reversing
Exploiting Reversing (ER) series: article 02 | Windows kernel drivers – part 02

The second article (85 pages) in the Exploiting Reversing (ER) series, a step-by-step vulnerability research series on Windows, macOS, hypervisors and browsers, is available for reading on: (PDF): …

Exploit Reversing
Exploiting Reversing (ER) series: article 02 | Windows kernel drivers – part 02

The second article (85 pages) in the Exploiting Reversing (ER) series, a step-by-step vulnerability research series on Windows, macOS, hypervisors and browsers, is available for reading on: (PDF): …

Exploit Reversing