Search Criteria
Search Results
Found 14 blog topic(s) in 2ms. The latest articles will appear on top:
- Reverse Engineering - Stepping Into a System CallHow to step into a SYSCALL with a debugger using kernel binary patch.August 25, 2023
- Critical Section vs Kernel ObjectsSpinning in user-mode versus entering kernel - the cost of a SYSCALL in Windows.August 19, 2023
- Reverse Engineering & Binary Augmentation - Snipping ToolScreencasts of the reverse engineering process to make binary patches to modify discontinued Microsoft Snipping Tool.August 8, 2023
- What Not to Do - Coding Apps in Assembly & Timely BackupsBatty, a game coded almost entirely in Assembly, plus importance of timely backups.July 11, 2023
- When Developers Give Up - DeleteSecurityPackage FunctionWhy it pays off to look into some Win32 functions with a disassembler.October 13, 2021
- Coding Windows Kernel Driver - InjectAllMaking the Visual Studio solution for DLL injection into all running processes.May 29, 2021
- Intricacies of Microsoft Compilers - Part 2The use of __imp_ and __imp_load_ prefixes.April 28, 2021
- Loop Optimization in C++Testing capabilities of the Visual C++ compiler to optimize loops.December 5, 2020
- Depths of Windows APCAspects of internals of the Asynchronous Procedure Calls from the kernel mode.November 27, 2020
- Deep Dive Into Windows PE Format - GetProcAddress SpoofingMalware researchers - Beware of GetProcAddress spoofing via manipulation of PE format in memory.October 1, 2020
- Deep Dive Into Assembly Language - Windows Shellcode - GetProcAddressHow to implement GetProcAddress in shellcode using x86-64 and x86 assembly language.September 14, 2020