Malware development trick 38: Hunting RWX - part 2. Target process investigation tricks. Simple C/C++ example. 9 minute read ﷽
Malware and cryptography 26: encrypt/decrypt payload via SAFER. Simple C/C++ example. 6 minute read ﷽