Trojan Horse Implementation in Hardware
When I speak about Hardware Hacking and its crucial role
Category
When I speak about Hardware Hacking and its crucial role
Many people ask me ‘what are the tools I need
Takes you from a “generic” C programmer to a master Windows programmer in user mode and kernel mode.
Broadens and deepens your understanding of the inner workings of Windows.
Provides the necessary knowledge, understanding, and tools to be a successful Windows OS researcher.
Takes you from zero-scratch knowledge novice to a real Cybersecurity professional.
Transform yourself from a novice to a seasoned hardware hacking expert.
In the video, I draw from my 15 years of
In this malware analysis video, we explore how MuddyWater, an
When I speak about Hardware Hacking and its crucial role
Some Windows kernel object types can have string-based names, which
Keyboard hooking using Image File Execution Options and pretending to
Ever wondered how many handles you can create in a
Authors Uriel Kosayev — @MalFuzzer, Hai Vaknin — @VakninHai, Tamir Yehuda — @Tamirye94, Matan Bahar — @Bl4ckShad3 Prologue
Many people ask me ‘what are the tools I need
Millions of machines around the world crashed a few days
By Uriel Kosayev (@MalFuzzer) Introduction Intel is a very well-known and
(CVE-2020-8842) Introduction MSI TrueColor utility comes as a pre-installed utility
In Windows, every process is associated with a parent process,
As Mac malware becomes more widespread, and as detection mechanisms
There are many processes running on a typical Windows system
A well-known features of Windows is the Image File Execution
Microsoft WslService Unquoted Service Path By Uriel Kosayev Introduction WslService
Last month, we decided to enrich our knowledge by delving
We’ll keep you up to date with the latest trends, free content and discounts
Software developer, trainer, consultant, author, and speaker. Co-author of “Windows Internals” 7th edition (2017). Author of “Windows Kernel Programming, 2nd ed” (2023), “Windows 10 System Programming Part 1” (2020) and Part 2 (2021).
Security researcher, consultant, and the author of the Antivirus Bypass Techniques book who lives both on the offensive and defensive fronts. Passionate about malware research, and red teaming while providing real-world security solutions.
30+ years of hands-on experience, Inventor, systems & electronics engineer, expert program manager, coder, cyber security researcher and startups mentor. Expert in Hardware-firmware-software integrated systems development
@2024 TrainSec. All rights reserved. Terms of Use | Privacy Policy
For a limited time, enjoy 25% off ALL available courses for the next month. Whether you’re looking to sharpen your skills or explore new areas of cybersecurity, now’s the perfect time to invest in your growth.
Use code BFRIDAY24 at checkout to claim your discount.