Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
Researching Evade Techniques For Morden EDR System Series' Articles
Back to windasunnie's Series
Calling calc.exe in Pure Shellcode by Walking the PEB
windasunnie
windasunnie
windasunnie
Follow
Apr 18 '25
Calling calc.exe in Pure Shellcode by Walking the PEB
#
shellcode
#
peb
#
kernel32
#
security
1
reaction
Comments
Add Comment
8 min read
Traverse the Process Environment Block (PEB) in Rust
windasunnie
windasunnie
windasunnie
Follow
May 2 '25
Traverse the Process Environment Block (PEB) in Rust
#
shellcode
#
rust
#
peb
#
security
1
reaction
Comments
Add Comment
4 min read
Building a Reverse Shell in Rust Using PEB Techniques
windasunnie
windasunnie
windasunnie
Follow
Jun 3 '25
Building a Reverse Shell in Rust Using PEB Techniques
#
rust
#
peb
#
reverseshell
#
security
1
reaction
Comments
Add Comment
2 min read
Exploring Process Injection, Hollowing, and Shellcode Execution in Windows
windasunnie
windasunnie
windasunnie
Follow
Sep 10 '25
Exploring Process Injection, Hollowing, and Shellcode Execution in Windows
#
shellcode
#
rust
#
security
#
valloc
Comments
Add Comment
3 min read
LSASS Memory Dumping Using Native Windows APIs
windasunnie
windasunnie
windasunnie
Follow
Oct 2 '25
LSASS Memory Dumping Using Native Windows APIs
#
security
#
kernel
#
minidump
Comments
Add Comment
4 min read
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account