Skip to content

Instantly share code, notes, and snippets.

View n1ght-w0lf's full-sized avatar
🎯
Focusing

Abdallah Elshinbary n1ght-w0lf

🎯
Focusing
View GitHub Profile
###################################### Will Schroeder (@harmj0y) #######################################
S4U2Pwnage
http://www.harmj0y.net/blog/activedirectory/s4u2pwnage/
A Guide to Attacking Domain Trusts
https://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/
Another Word on Delegation
https://www.harmj0y.net/blog/redteaming/another-word-on-delegation/

TitanEngine

Introduction to TitanEngine

One of the greatest challenges of modern reverse engineering is taking apart and analyzing software protections. During the last decade a vast number of such shell modifiers have appeared. Software Protection as an industry has come a long way from simple encryption that protects executable and data parts to current highly sophisticated protections that are packed with tricks aiming at slow down in the reversing process. Number of such techniques increases every year. Hence we need