Demonstrates

Jektor – A Windows User-Mode Shellcode Execution Tool That Demonstrates Various Techniques That Malware Uses

This utility focuses on shellcode injection techniques to demonstrate methods that malware may use to execute shellcode on a victim… Read More

2 years ago

Researcher Demonstrates Hiding Data In Twitter Images

While steganography is nothing new, a researcher has taken this technique to the next level.… Researcher Demonstrates Hiding Data In… Read More

3 years ago

Widevine-L3-Decryptor – A Chrome Extension That Demonstrates Bypassing Widevine L3 DRM

Widevine is a Google-owned DRM method that's in use by several common streaming expert services (Netflix, Spotify, and many others.)… Read More

4 years ago