Reverse engineering

.NET Assembly Programming

Abstract In this series, we'll examine the core details of creating, deploying and configuring .NET assemblies and its advantage over existing COM technolog

.NET Reverse Engineering-1:CIL Programming

Introduction The prime objective of this article is to confront with the .NET mother tongue language termed as Common Instruction Language (CIL) which laid d

Windows Memory Protection Mechanisms

Introduction When trying to protect memory from being maliciously used by the hackers, we must first understand how everything fits in the whole picture. Let

Dynamic Programming Tutorial

Introduction The dissertation investigates attributes. You'll see how you can define attributes on various items within your program. We shall also discuss

How USB Malware Works

Introduction In this article we will look at malware that propagate to other machines using USB removable devices. Unlike most malware which make use of

Calling NTDLL functions directly

If you're reading this, then you've probably wanted to call some internal ntdll function that isn't exported and easily callable, right? If no, then let me e

LUKS and LVM

LVM + LUKS LVM is software that uses physical devices as physical volumes (PVs) in storage pools called volume group (VG). Physical volumes can be a partiti

Using SetWindowsHookEx for DLL injection on windows

Note: all the code examples can be found on my Github profile under visual-studio-projects accessible here: https://github.com/proteansec . [pkadzone zo

API hooking and DLL injection on Windows

Note: all the code examples can be found on my Github profile under visual-studio-projects accessible here: https://github.com/proteansec. [pkadzone zon

Using CreateRemoteThread for DLL injection on Windows

Note: all the code examples can be found on my Github profile under visual-studio-projects accessible here: https://github.com/proteansec . [pkadzone zo