📒
Book of VanLuong
search
⌘Ctrlk
📒
Book of VanLuong
  • 👨‍💻About the Author
  • Cryptography
    • Cryptanalysis
  • C2
    • Practical with Havoc Framework
  • Blue Teaming
    • SIEM & SOC
    • SIEM Tools
    • PowerShell in Incident Response and Threat Hunting
  • Techniques used in malware
    • DLL side loadingarrow-up-right
    • DLL Unhookingarrow-up-right
    • Call stack spoofingarrow-up-right
  • Wazuh App Dashboards for Splunkarrow-up-right
  • Cyber Threat Intelligence
  • Windows
  • Guide to Installing Kali Linux, DVWA, and bWAPP
  • CTF
    • CTF-writeup-in-KCSCarrow-up-right
  • Red Teaming
    • Active Directory
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Techniques used in malware

DLL side loadingchevron-rightDLL Unhookingchevron-rightCall stack spoofingchevron-right
PreviousPowerShell For Threat Huntingchevron-leftNextCyber Threat Intelligencechevron-right