Published inSystem WeaknessBreaking Through AMSI: Bypassing Runtime Detection in WindowsRuntime Detections5d ago5d ago
Published inSystem WeaknessAndroid Hacking (Part2) : Reverse Engineering & Static AnalysisReversingFeb 22Feb 22
Android Components: Core Building Blocks of Android AppsAndroid applications are built using four main Android components, each serving a specific role in the app’s functionality. These…Feb 13Feb 13
Published inSystem WeaknessAV Evasion Techniques Part 4: Packing & Encoding Payloads for EvasionShellcode Encoding and EncryptionFeb 3Feb 3