Red Team Leaders
search
⌘Ctrlk
Red Team Leaders
  • Welcome
  • DOCUMENTATION
    • Adversary Emulation Guide
    • Red Team Operations Framework
    • Purple Team Operations
    • The first 90 days of a new Red Team
  • Red Team Infrastructure
    • Command and Control
  • OFFENSIVE SECURITY
    • Defense Evasion
    • Credential Access
    • Windows Internals and API
      • Building Backdoors with Alternative Socket with lib-nosa (No Socket API)
      • Windows API Hashing to Malware
      • Detection of Hooked Syscalls in ntdll.dll
      • Credential Exposure in Memory
    • Privilege Escalation
    • Malware Development
    • Initial Access
  • Offensive Artificial Intelligence
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. OFFENSIVE SECURITY

Windows Internals and API

Building Backdoors with Alternative Socket with lib-nosa (No Socket API)chevron-rightWindows API Hashing to Malwarechevron-rightDetection of Hooked Syscalls in ntdll.dllchevron-rightCredential Exposure in Memorychevron-right
PreviousDumping LSASS with Direct Syscallschevron-leftNextBuilding Backdoors with Alternative Socket with lib-nosa (No Socket API)chevron-right