-
Recent Posts
- Shellcode: Windows on ARM64 / AArch64
- Delegated NT DLL
- WOW64 Callback Table (FinFisher)
- Shellcode: Linux on RISC-V 64-Bit
- MiniDumpWriteDump via COM+ Services DLL
- Shellcode: In-Memory Execution of JavaScript, VBScript, JScript and XSL
- Shellcode: In-Memory Execution of DLL
- Shellcode: Loading .NET Assemblies From Memory
- Shellcode: A reverse shell for Linux in C with support for TLS/SSL
- How the L0pht (probably) optimized attack against the LanMan hash.
Tag Archives: EXE
Shellcode: In-Memory Execution of DLL
Introduction In March 2002, the infamous group 29A published their sixth e-zine. One of the articles titled In-Memory PE EXE Execution by Z0MBiE demonstrated how to manually load and run a Portable Executable entirely from memory. The InMem client provided … Continue reading
Posted in assembly, injection, programming, security, shellcode, windows
Tagged DLL, EXE, in-memory, x86 assembly
4 Comments