WinAPI 9
- Reverse engineering a trojanized VSCode extension
- Windows Persistence (Part 1): Default file extension hijacking
- Exploring the Kernel-Mode attack surface: Reverse engineering a vulnerable Driver abused to terminate EDRs
- APC injection
- Process Injection - DLL Injection
- Constructing an evasive keylogger for security research
- Ransomware: reversing what was (supposedly) irreversible
- Building a Debugger from Scratch: Part 2 - Process Exploration and Debug Control
- Process Injection (Remote Thread Injection) using Windows APIs