MacOS hacking part 4: rev shells via x86_64 assembly. Simple NASM and C (Intel, ARM) examples 10 minute read ﷽
Malware development trick 48: leveraging Office macros for malware. Simple VBA example. 4 minute read ﷽