- advanced function obfuscation by implementing customized API calls
- more advanced code injection techniques
- advanced DLL injection techniques
- understanding how reflective binaries work and building custom reflective DLLs
- hijacking and camouflaging trojan shellcodes inside legitimate running processes
- memory hooking to subvert the normal flow of a running process
- exploiting the vulnerability in 32- and 64-bit process migrations
- hooking the Import AddressTables (IAT) to replace it with your own functions
- using inter process communication to control execution of multiple trojan processes
- hooking API calls and replacing them with your own customized function
- implementing DLL injection and API hooking to sniff and capture disk encryption passwords
- advanced AV evasion and obfuscation techniques
- and more...
У вас должно быть более 20 реакций для просмотра скрытого контента.
password: https://t.me/HackingAssets