Windows : Difference between WinMain,main and DllMain in C++
Windows : Difference between WinMain,main and DllMain in C++

Hey Delphi A year ago

Windows : Difference between WinMain,main and DllMain in C++ To Access My Live Chat Page, On Google, Search for "hows ...

C++ Class wrapper on top of WinMain/DllMain (2 Solutions!!)
C++ Class wrapper on top of WinMain/DllMain (2 Solutions!!)

Roel Van de Paar 3 years ago

C++ Class wrapper on top of WinMain/DllMain Helpful? Please support me on Patreon: https://www.patreon.com/roelvandepaar ...

C++ : Dllmain not being called?
C++ : Dllmain not being called?

Hey Delphi A year ago

C++ : Dllmain not being called? To Access My Live Chat Page, On Google, Search for "hows tech developer connect" So here is a ...

Loader Dumps Arcade Emulator Inject Dll - APIENTRY DllMain | Suspend & Resume - Game Hacking Hooking
Loader Dumps Arcade Emulator Inject Dll - APIENTRY DllMain | Suspend & Resume - Game Hacking Hooking

vicboma1 6 years ago

Lanzadera básica por línea de comandos en C# Loader en C# Injector en C# Librería dinámica (DLL) en C Nativo para este ...

Loader Dumps Arcade Emulator Inject Dll - APIENTRY DllMain | Suspend Process - Game Hacking Hooking
Loader Dumps Arcade Emulator Inject Dll - APIENTRY DllMain | Suspend Process - Game Hacking Hooking

vicboma1 6 years ago

Lanzadera básica por línea de comandos en C# Loader en C# Injector en C# Librería dinámica (DLL) en C Nativo para este ...

EP0058 - Dynamic code loading with DLLs Part II - Making a video game from scratch in C
EP0058 - Dynamic code loading with DLLs Part II - Making a video game from scratch in C

Ryan Ries 4 years ago

We are going to program a video game from scratch using almost no help from any libraries or engines. Just our code. Join us!

EP0057 - Moving the game code into a separate DLL - Making a video game from scratch in C
EP0057 - Moving the game code into a separate DLL - Making a video game from scratch in C

Ryan Ries 4 years ago

We are going to program a video game from scratch using almost no help from any libraries or engines. Just our code. Join us!

All About DLL Hijacking - My Favorite Persistence Method
All About DLL Hijacking - My Favorite Persistence Method

IppSec 3 years ago

00:00 - Intro 00:25 - Why DLL Hijack is my favorite persistence, talk about a few others 02:03 - Going over the source code to our ...

WIN API for Game Developers, part 1, days 0-10, introduction.
WIN API for Game Developers, part 1, days 0-10, introduction.

Low Level Game Dev 10 months ago

In this tutorial series, I aim to help you learn the Windows API. By the end, you will be able to make a basic game, using no ...

How To Find Start Of Actor Code (WinMain) In Malware
How To Find Start Of Actor Code (WinMain) In Malware

AGDC Services 4 years ago

View our malware analysis training: https://AGDCservices.com/training/ Follow me on Twitter for RE tips and resources: ...

DLL Proxy and WinDbg
DLL Proxy and WinDbg

Sam Bowne 4 years ago

A college class at CCSF More info: https://samsclass.info/126/126_F20.shtml.

Creating and using Win32 DLL files : C++ Tutorial #164
Creating and using Win32 DLL files : C++ Tutorial #164

Alan Carre 11 years ago

Watch Series: http://www.youtube.com/watch?v=G2nLcT8daYg&list=PLLDzV9QzfAcW2vdR_dyqQ01rcdnY8YT-0 The first step in ...

Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator
Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator

Black Hat 5 years ago

In this presentation, we'll look at Defender's emulator for analysis of potentially malicious Windows PE binaries on the endpoint.

Old Developer Tools - Borland C++ 3
Old Developer Tools - Borland C++ 3

Tomeu Capó 2 years ago

Sneak peak of Borland C++ 3 for DOS and Windows 3.11. IDE and sneak peak of additional tools like TProf and TD.

Разработка приложений с помощью WinAPI. Урок 12 DLL. Функции
Разработка приложений с помощью WinAPI. Урок 12 DLL. Функции

VoidPtr 6 years ago

На улучшение компьютера: https://www.donationalerts.ru/r/voidptr Сегодня мы рассмотрим как загружать функции из DLL.

Malware Reverse Engineering: NotPetYa Case Study
Malware Reverse Engineering: NotPetYa Case Study

Martian Defense A year ago

This is an intermediate live training session where we dissect the NotPetYa Malware to understand the technical details behind it.

CNIT 126: OllyDbg
CNIT 126: OllyDbg

Sam Bowne 4 years ago

A college class at CCSF More info: https://samsclass.info/126/126_F20.shtml.

Reverse Engineering Windows Defenders Emulator
Reverse Engineering Windows Defenders Emulator

Velimir Radlovački 6 years ago

PLEASE SUBSCRIBE TO KEEP THIS CHANNEL ALIVE! Tip Jar: https://paypal.me/radlovacki Windows Defender Antivirus's ...

CNIT 126 9 OllyDbg
CNIT 126 9 OllyDbg

Sam Bowne 3 years ago

A Malware Analysis class at CCSF More info: https://samsclass.info/126/126_F21.shtml.

CNIT 126 Ch 9: OllyDbg
CNIT 126 Ch 9: OllyDbg

Sam Bowne 4 years ago

A lecture for a Malware Analysis class More info: https://samsclass.info/126/126_S21.shtml.

Hunting for Windows “Features” and How To Use Them | Chris Spehn | WWHF San Diego 2022
Hunting for Windows “Features” and How To Use Them | Chris Spehn | WWHF San Diego 2022

Wild West Hackin' Fest 2 years ago

Attend Wild West Hackin' Fest (WWHF) in Deadwood, In-Person and Virtual! https://wildwesthackinfest.com/deadwood/ Offensive ...

CNIT 126: 9: OllyDbg
CNIT 126: 9: OllyDbg

Sam Bowne 5 years ago

A college lecture at City College San Francisco. Based on "Practical Malware Analysis: The Hands-On Guide to Dissecting ...

C# Assemblies
C# Assemblies

Anitha Haridas 4 years ago

C# Assemblies - A Brief Discussion.

CNIT 126 - Practical Malware Analysis, September 18, 2018 Lecture
CNIT 126 - Practical Malware Analysis, September 18, 2018 Lecture

Educational Access TV San Francisco 6 years ago

Recorded on September 18, 2018 in the Distance Learning Classroom at the Ocean Campus of City College of San Francisco.

📼 Hooks - Хуки (Win32 API). Программирование в ОС Windows. Лекция 6.
📼 Hooks - Хуки (Win32 API). Программирование в ОС Windows. Лекция 6.

Denis Maltsev 4 years ago

Ульяновский Государственный Университет. Факультет Математики Информатики и Авиационных Технологий. Кафедра ...

U4Tema4
U4Tema4

INSTITUTO TELESUP COMPUTACION 8 years ago

Основы создания графических приложений в системе Windows
Основы создания графических приложений в системе Windows

Aleksey Malov 3 years ago

Создание графических приложений с использованием Win32 API.

CNIT 126 Ch 9
CNIT 126 Ch 9

Sams Class 7 months ago

A lecture for a Malware Analysis class More info: https://samsclass.info/126/126_S24.shtml.

Using Direct Syscalls in Cobalt Strike's Artifact Kit
Using Direct Syscalls in Cobalt Strike's Artifact Kit

Cobalt Strike Archive 4 years ago

This video demonstrates how to use direct syscalls in Cobalt Strike's Artifact Kit to avoid userland hooks when loading Beacon ...

[SITCON 2014] 從技術面簡介線上遊戲外掛 - Zuan
[SITCON 2014] 從技術面簡介線上遊戲外掛 - Zuan

SITCON 學生計算機年會 10 years ago

從技術面探討遊戲外掛運行的原理,討論三大類遊戲外掛:記憶體修改外掛、自動化外掛、封包修改外掛;尤其著重於記憶體修改 ...

Résultats de Youtube (Conditions d'utilisation)Politique de confidentialité Google