• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Recent content by Vigo0x1

  1. V

    I can't react to this post even though I've posted 8 topics

    Sorry, me and the new member of the forum, however I have posted articles on the forum, but I cannot react to the posts and download the content.
  2. V

    Windows Alternative Methods for Process Injection Without Using WriteProcessMemory - Seeking Insights

    Hello Everyone, I'm exploring the realm of process injection into other applications and am interested in understanding the methods available to achieve this without relying on the `WriteProcessMemory` function, commonly used in traditional process injection techniques. My goal is to uncover...
  3. V

    C/C++ Creating a Reverse Proxy Program in C++

    Introduction Definition of Reverse Proxy: A reverse proxy is a server that sits between clients and the servers they are accessing. It intercepts requests from clients and forwards them to the appropriate server. Reverse proxies are used for load balancing, security, and caching. Purpose of...
  4. V

    Bypass AV Books

    I'm learning about AV bypass, do you have any books that provide this?
  5. V

    Linux Privilege Escalation in Linux

    Privilege escalation is a critical component in the field of cybersecurity, especially concerning Linux systems. This topic delves into the methods and strategies used to gain higher-level permissions on a Linux system, often exploited in ethical hacking, penetration testing, and cybersecurity...
  6. V

    C/C++ Creating a Webcam Stream Using C++

    Basics of C++ and Image Processing: Understanding the fundamentals of C++ programming and basic concepts of image processing which are crucial for manipulating webcam data. Accessing Webcam with C++ Libraries: Discussion on various C++ libraries (like OpenCV, Boost, and others) that can be used...
  7. V

    Windows Bypassing UAC on Windows - A Closer Look at Security Implications

    User Account Control (UAC) is a security feature in Windows that helps prevent unauthorized changes to your computer. However, in certain scenarios, it can be bypassed. In this discussion, we'll delve into the concept of bypassing UAC, the potential security risks involved, and methods to...
  8. V

    Windows Process Injection Techniques in Computer Security

    Process Injection techniques are commonly used by both hackers and cybersecurity experts to infiltrate systems and perform unauthorized actions. Below, let's discuss how this technique works and ways to protect against it: What is Process Injection?: Provide a basic definition of Process...
  9. V

    How to Injection in Windows don't use Write process

    Hello, I'm learning how to inject a process on windows. However, using APIs like read write process can easily cause AV problems. So is there any effective way to bypass this?
Back
Top