User Account Control bypass techniques that allow malware to operate stealthily and resist detection and removal efforts. The key findings highlight the innovative and diverse methods used by modern malware to evade security measures, emphasizing the need for advanced and comprehensive security solutions to counter these threats.
- pe_to_shellcode
- Parsing Kernel32’s Export Table in x86 Assembly
- Getting API Addresses in x86 Assembly
- File Mapping and Repairing the Import Table in x86
- Unicorn project
- msfvenom – nasm
- Rust and Python Shellcode Generator
- Writing 32-bit Shellcode in x86 Assembly
- Dynamic Crawling Function in PE (Portable Executable)
- Understanding EATs in PE (Portable Executable)
- EATs in PE (Portable Executable)
- ROP