Click here to Skip to main content
15,993,495 members
Everything / Protection

Protection

protection

Great Reads

by Apriorit Inc
Being able to switch between 32-bit and 64-bit modes in Windows is a useful skill. Learn about the heaven’s gate technique and the tools and methods needed for hooking 64-bit processes from the 32-bit WOW64 mode.
by Shakhansho
An overview of newly written package anonympy and a walk-through some of its methods and functionality
by Apriorit Inc
Two theoretical ways to protect a Linux kernel module from hooks.
by Trần_Tuấn_Anh
Cross-Site Request Forgery (CSRF) is a serious security vulnerability that can compromise your web applications. It tricks users into performing actions they didn't intend, often leading to unauthorized actions on a website.

Latest Articles

by Trần_Tuấn_Anh
Cross-Site Request Forgery (CSRF) is a serious security vulnerability that can compromise your web applications. It tricks users into performing actions they didn't intend, often leading to unauthorized actions on a website.
by Shakhansho
An overview of newly written package anonympy and a walk-through some of its methods and functionality
by Apriorit Inc
Being able to switch between 32-bit and 64-bit modes in Windows is a useful skill. Learn about the heaven’s gate technique and the tools and methods needed for hooking 64-bit processes from the 32-bit WOW64 mode.
by Apriorit Inc
Two theoretical ways to protect a Linux kernel module from hooks.

All Articles

Sort by Score

Protection 

23 Mar 2020 by Apriorit Inc
Being able to switch between 32-bit and 64-bit modes in Windows is a useful skill. Learn about the heaven’s gate technique and the tools and methods needed for hooking 64-bit processes from the 32-bit WOW64 mode.
9 Feb 2022 by Shakhansho
An overview of newly written package anonympy and a walk-through some of its methods and functionality
9 Jan 2019 by Apriorit Inc
Two theoretical ways to protect a Linux kernel module from hooks.