-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathindex.xml
More file actions
30 lines (30 loc) · 1.94 KB
/
index.xml
File metadata and controls
30 lines (30 loc) · 1.94 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
<channel>
<title>aeverj's blog</title>
<link>https://aeverj.github.io/</link>
<description>关于 LoveIt 主题</description>
<generator>Hugo -- gohugo.io</generator><language>zh-CN</language><copyright>This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.</copyright><lastBuildDate>Wed, 04 May 2022 00:00:00 +0800</lastBuildDate>
<atom:link href="https://aeverj.github.io/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>RDI 反射dll加载(KaynLdr)</title>
<link>https://aeverj.github.io/posts/rdi-%E5%8F%8D%E5%B0%84dll%E5%8A%A0%E8%BD%BD/</link>
<pubDate>Wed, 04 May 2022 00:00:00 +0800</pubDate>
<author>作者</author>
<guid>https://aeverj.github.io/posts/rdi-%E5%8F%8D%E5%B0%84dll%E5%8A%A0%E8%BD%BD/</guid>
<description><![CDATA[<p>RDI是无文件落地,直接内存加载执行PE的技术,C2中经常使用。</p>]]></description>
</item><item>
<title>利用Syscall免杀 v2.0</title>
<link>https://aeverj.github.io/posts/syscall%E5%85%8D%E6%9D%80/</link>
<pubDate>Wed, 16 Feb 2022 00:00:00 +0800</pubDate>
<author>作者</author>
<guid>https://aeverj.github.io/posts/syscall%E5%85%8D%E6%9D%80/</guid>
<description><![CDATA[<p>winx64中动态获取syscall调用号,绕过AV/EDR对ntdll的hook</p>]]></description>
</item><item>
<title>C#中利用Syscall免杀 v1.0</title>
<link>https://aeverj.github.io/posts/csharp%E4%B8%AD%E5%88%A9%E7%94%A8syscall-%E5%85%8D%E6%9D%80/</link>
<pubDate>Sun, 13 Feb 2022 00:00:00 +0800</pubDate>
<author>作者</author>
<guid>https://aeverj.github.io/posts/csharp%E4%B8%AD%E5%88%A9%E7%94%A8syscall-%E5%85%8D%E6%9D%80/</guid>
<description><![CDATA[<p>在ring3利用直接系统调用来绕过杀软对敏感函数的Hook</p>]]></description>
</item></channel>
</rss>