Skip to main content
OverflowMyBuffers
  • Home
  • Active Directory1
  • Appian5
  • Cloud4
  • Code Reviews1
  • CRTO Notes4
  • Docker1
  • General2
  • Keycloak1
  • Mendix1
  • Mobile1
  • OSED4
  • OSEP Notes3
  • OSINT1
  • OSMR1
  • OSWA1
  • OSWE Notes6
  • Pentesting AI2
  • Reverse Engineering1
  • SAP9
  • Sap Security1
  • Sliver1
  • Tools1
  • Web5
  • Wifi7
Did you know?

Living-off-the-land binary (LOLBin) abuse uses legitimate Windows utilities like mshta.exe, certutil.exe, rundll32.exe, and regsvr32.exe to execute malicious payloads without dropping custom executables.

← All topics

Reverse Engineering

1 note

Notes

  • Reverse EngineeringThese notes have been taken from the book: 'Mastering Reverse Engineering' Written by Reginald Wong and released by Packt. * Windows 7 (or whatever) machine,
Privacy PolicyManage cookie preferences