Code Snippets (Beta)
Name |
Tags |
Languages |
Date |
Cave Explorer (Code Cave Finder) |
Code Cave
PE
Backdoor
Exploit
|
1 |
3 weeks, 4 days |
Hex Dump (Table) |
Memory
Dump
Debug
Hex
|
1 |
2 months |
Embed File in Windows Shortcut |
Evasion
Dropper
Shortcut
|
1 |
5 months, 1 week |
Extract Strings from Binary (ANSI / Unicode) |
Strings
Extraction
|
1 |
5 months, 1 week |
Uncover Supported File Extension by Windows Explorer |
Bruteforce
Explorer
File Extensions
|
1 |
5 months, 1 week |
Get Process Name via GetProcessImageFileName |
Process
System Information
|
1 |
5 months, 1 week |
Get Process Name via NtQueryInformationProcess |
Process
System Information
|
1 |
5 months, 1 week |
Get Process Name via GetMappedFileName |
Process
System Information
|
1 |
5 months, 1 week |
Get Process Name via QueryFullProcessImageName |
Process
System Information
|
1 |
5 months, 1 week |
Select File(s) on Explorer |
Shell32
Explorer
|
1 |
5 months, 1 week |
Enumerate DLL Exports |
Enumerate
PE
PE+
Exports Table
|
1 |
5 months, 1 week |
GetProcAddress Alternative via PE Export Table |
GetProcAddress
DLL
Export Table
PE
|
1 |
5 months, 1 week |
Please note that this page is currently undergoing reconstruction and may contain incomplete
content. We are working diligently to bring the old content up to date and add new information. We
appreciate your patience during this process.
Please stay tuned for more updates and new content. We are committed to providing you with comprehensive
and valuable information. Thank you for your understanding.