Understanding RunDLL32: Leveraging Dynamic Function Invocation
Unlock the power of RunDLL32! Learn how to execute DLL functions, invoke control panel dialogs, and test custom DLLs with our latest guide. Packed with
KNOWLEDGE LIBRARY
Immerse yourself in cutting-edge Cybersecurity knowledge from industry-insiders. Access reliable research insights, practical guides, and updates on the latest cybersecurity trends.
Unlock the power of RunDLL32! Learn how to execute DLL functions, invoke control panel dialogs, and test custom DLLs with our latest guide. Packed with
Unlock the power of RunDLL32! Learn how to execute DLL functions, invoke control panel dialogs, and test custom DLLs with our latest guide. Packed with
Explore BlackByte ransomware: ProxyShell exploits, anti-debugging, and reverse engineering insights. Dive deep into this malware’s
Shell extensions are a powerful feature of the Windows shell that allow developers to extend
Attention TrainSec.net students! Mark your calendars for an exclusive live workshop designed to take your
Remote Procedure Calls (RPC) are a fundamental mechanism in distributed computing, allowing functions to execute
Remote Procedure Calls (RPC) are a fundamental mechanism in distributed computing, allowing functions to execute
Note: This blog post is designed to complement the accompanying video embedded at the top
We’ll keep you up to date with the latest trends, free content and discounts
In this video, I’ll show you how to debug a DLL file with an IDA
Introduction: Writing a Windows Service Hi, and welcome to this video on writing a Windows
Welcome to this video about Windows Services. In this video, we’ll cover the basics of
Hi, and welcome to this video about an introduction to the Windows Performance Analyzer. We’re
We’re excited to share a special occasion with you – Uriel Kosayev, one of our
In the video, I draw from my 15 years of experience to explain that recognizing
In this malware analysis video, we explore how MuddyWater, an Iranian APT group, utilizes legitimate
When I speak about Hardware Hacking and its crucial role in the safety of our
Some Windows kernel object types can have string-based names, which is one way such objects
Keyboard hooking using Image File Execution Options and pretending to be a debugger.
Ever wondered how many handles you can create in a process? Each process has its
Authors Uriel Kosayev — @MalFuzzer, Hai Vaknin — @VakninHai, Tamir Yehuda — @Tamirye94, Matan Bahar — @Bl4ckShad3 Prologue As red teamers, we are
Many people ask me ‘what are the tools I need to bug in order to
Millions of machines around the world crashed a few days ago, showing the dreaded “Blue
By Uriel Kosayev (@MalFuzzer) Introduction Intel is a very well-known and large company that serves many
(CVE-2020-8842) Introduction MSI TrueColor utility comes as a pre-installed utility program on MSI gaming laptops
In Windows, every process is associated with a parent process, usually the one created it.
As Mac malware becomes more widespread, and as detection mechanisms get more sophisticated, malware actors
There are many processes running on a typical Windows system – here are some of
A well-known features of Windows is the Image File Execution Options registry key located in
Microsoft WslService Unquoted Service Path By Uriel Kosayev Introduction WslService is a deployed service on
Last month, we decided to enrich our knowledge by delving into research on a popular
@2024 TrainSec. All rights reserved. Terms of Use | Privacy Policy