Introduction
Follow On Twitter
Articles
Index
Defcon advices
Malware
Docs
Code Snippet
Dumpbin
NTStructure
Passing Arguments
Basics
Introduction
PE
Payload Storage
Payload Encryption
Function Call Obfuscation
Backdooring PE
EDR
TrendMicro
Elastic EDR
Techniques
COFF Loader
ETW
Function Hooking
Kernel Callback
Module Stomping
Remote DLL Injection
Reflective DLL Injection
Tools
IDA
R2
Pentest
Cloud
AWS
Azure
Configuration Review
Database
Kubernetes
KubernetesCIS
Services
AD
Databases
Oracle Database
MSSQL
DNS
IPMI
Kerberos
LDAP
Memcached
NFS
RPC
SMB
SNMP
Tomcat
WebDAV
Techniques
Abuse ADCS
Abuse Tokens
Abuse Trusts
Buffer Overflow
Command Injection
Data Exfiltration
DPAPI
Exploit handles
Filtering
Kioske Escape
LFI
Password Spraying
Pivoting
Privilege Escalation
Windows
Linux
Reverse Shell
Scrapping
Shellshock
SQL Injection
SSTI
Technology
AD
IOS
NAC
Port Knocking
SAML
SAP
Tools
BloundHound
CME
Curl
FFUF
Find
Hydra
PowerView
Powershell
Responder
Rubeus
Strace
Wfuzz
Rainy Sunday
Killer AX1650
KMS Activation
Licence Key
Published with GitBook
IDA
IDA
Decompiler view
Rename symbol
Retype symbol
Get reference from an imported function
Previous click
Decompiler view
F5
Rename symbol
n
Retype symbol
y
Get reference from an imported function
Go to the import tab
Double click the function
Type
x
on the symbol to open the
xref
window
Previous click
ESC
results matching "
"
No results matching "
"
results matching "
"
No results matching "
"