• XSS.stack #1 – первый литературный журнал от юзеров форума

making exe run in memory instead of hard disk

Пожалуйста, обратите внимание, что пользователь заблокирован
Reflective injection: This method involves loading a library into memory and manually invoking its entry point, rather than relying on the operating system to do so. This can be useful for bypassing simple runtime detection mechanisms that look for specific libraries being loaded.

Process hollowing: This technique involves creating a new process in memory, then replacing its code with the code you want to execute. This can be used to evade detection by hiding the injected code within another process.

Thread injection: Similar to process hollowing, thread injection involves creating a new thread within a legitimate process and injecting code into it. This can be used to evade detection by hiding the injected code within a legitimate thread.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Reflective injection: This method involves loading a library into memory and manually invoking its entry point, rather than relying on the operating system to do so. This can be useful for bypassing simple runtime detection mechanisms that look for specific libraries being loaded.

Process hollowing: This technique involves creating a new process in memory, then replacing its code with the code you want to execute. This can be used to evade detection by hiding the injected code within another process.

Thread injection: Similar to process hollowing, thread injection involves creating a new thread within a legitimate process and injecting code into it. This can be used to evade detection by hiding the injected code within a legitimate thread.
i am looking for tool even if it's paid to use it with macos payload , any suggestion ?
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Пожалуйста, обратите внимание, что пользователь заблокирован


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх