Media Summary: Short example of how to deflect a DLL injenction to a process of our choice in order to better study it. Slides: Talk Description: In this presentation, we share details of our ... Recorded on October 23, 2018 in the Distance Learning Classroom at the Ocean Campus of City College of San Francisco.

Pimping Ehem Hooking Malware - Detailed Analysis & Overview

Short example of how to deflect a DLL injenction to a process of our choice in order to better study it. Slides: Talk Description: In this presentation, we share details of our ... Recorded on October 23, 2018 in the Distance Learning Classroom at the Ocean Campus of City College of San Francisco. Revisiting ring3 API hooks: tricks to defeat analysis tools... Even the famous ones ▫ Ekoparty 2021 ▫ Main Track One of the ... In this demo, we explore how to secure AI-driven development using the new Cursor Hooks capability. As AI agents increasingly ... In this video I have shown how to live debug a malicious Javascript file using x32dbg by applying necessary breakpoints via API ...

Don't forget to check out the entire playlist here ...

Photo Gallery

Pimping, ehem... Hooking Malware
API Hooking - RTO: Malware Development Intermediate course teaser
Malware Evasion Techniques: API Unhooking (Malware Analysis & Reverse Engineering)
Malware Analysis - Hook Injection PoC by Robert Kuster
API Hooking, part1
Writing Custom Malware: Import Address Table Hooking
Malware Analysis - Defeating ConfuserEx Anti-Analysis with Hooking
API hooking simplified
OBTS v8: “Hook, Line & Koi Stealer: New macOS Malware in DPRK Fake Job Interviews” A Gabay & D Frank
CNIT 126 - Practical Malware Analysis, October 23, 2018 Lecture
Pentest.blog - Offensive IAT Hooking
API Hooking, part2
View Detailed Profile
Pimping, ehem... Hooking Malware

Pimping, ehem... Hooking Malware

Short example of how to deflect a DLL injenction to a process of our choice in order to better study it.

API Hooking - RTO: Malware Development Intermediate course teaser

API Hooking - RTO: Malware Development Intermediate course teaser

API

Malware Evasion Techniques: API Unhooking (Malware Analysis & Reverse Engineering)

Malware Evasion Techniques: API Unhooking (Malware Analysis & Reverse Engineering)

Build real confidence analyzing

Malware Analysis - Hook Injection PoC by Robert Kuster

Malware Analysis - Hook Injection PoC by Robert Kuster

We analyse a

API Hooking, part1

API Hooking, part1

Sample-10-7

Writing Custom Malware: Import Address Table Hooking

Writing Custom Malware: Import Address Table Hooking

https://jh.live/maldevacademy || Learn to write modern 64-bit Windows

Malware Analysis - Defeating ConfuserEx Anti-Analysis with Hooking

Malware Analysis - Defeating ConfuserEx Anti-Analysis with Hooking

Malware

API hooking simplified

API hooking simplified

malware

OBTS v8: “Hook, Line & Koi Stealer: New macOS Malware in DPRK Fake Job Interviews” A Gabay & D Frank

OBTS v8: “Hook, Line & Koi Stealer: New macOS Malware in DPRK Fake Job Interviews” A Gabay & D Frank

Slides: https://objectivebythesea.org/v8/talks/OBTS_v8_aGabay.pdf Talk Description: In this presentation, we share details of our ...

CNIT 126 - Practical Malware Analysis, October 23, 2018 Lecture

CNIT 126 - Practical Malware Analysis, October 23, 2018 Lecture

Recorded on October 23, 2018 in the Distance Learning Classroom at the Ocean Campus of City College of San Francisco.

Pentest.blog - Offensive IAT Hooking

Pentest.blog - Offensive IAT Hooking

This article will be about using IAT

API Hooking, part2

API Hooking, part2

Malware

Revisiting ring3 API hooks: tricks to defeat analysis tools ▪ Rafael Salema Marquez ▪ Ekoparty 2021

Revisiting ring3 API hooks: tricks to defeat analysis tools ▪ Rafael Salema Marquez ▪ Ekoparty 2021

Revisiting ring3 API hooks: tricks to defeat analysis tools... Even the famous ones ▫ Ekoparty 2021 ▫ Main Track One of the ...

How to Block Malware with Cursor Hooks and Endor Labs

How to Block Malware with Cursor Hooks and Endor Labs

In this demo, we explore how to secure AI-driven development using the new Cursor Hooks capability. As AI agents increasingly ...

Malware Analysis   Hook Analyser 1 4

Malware Analysis Hook Analyser 1 4

Malware Analysis Hook Analyser 1 4

Analyzing a JavaScript Malware With x32dbg Debugger and API Hooking

Analyzing a JavaScript Malware With x32dbg Debugger and API Hooking

In this video I have shown how to live debug a malicious Javascript file using x32dbg by applying necessary breakpoints via API ...

What is Inline API Hooking? | Reverse Engineering Interview Questo

What is Inline API Hooking? | Reverse Engineering Interview Questo

Don't forget to check out the entire playlist here ...

how hackers actually embed malware into your emails

how hackers actually embed malware into your emails

How hackers actually embed