Highlights
- Pro
Stars
1
star
written in Nim
Clear filter
A deep dive into DLL hijacking, proxying, and malware development techniques. Explore Windows binary exploitation, dynamic linking abuse, and stealthy persistence methods.