Skip to primary content
Skip to secondary content

WireDiver

WireDiver

Main menu

  • Home
  • Tutorials
    • Writing a PE packer >
      • Introduction
      • Part 1 : load a PE in memory
      • Part 2 : handling imports and relocations
      • Part 3 : packing with python
      • Part 4 : packing with no relocation
      • Part 5 : simple obfuscation
  • Blog
    • Reverse
    • Tooling

Tag Archives: experiment

Windows PEB parsing – A binary with no imports

Posted on 27 February 2021 by Jeremy

We’re going to see how a program can parse the PEB to recover Kernel32.dll address, and then load any other library. Not a single import is needed !

Continue reading →

Posted in Reverse, Tutorial | Tagged experiment, obfuscation, programming, tutorial | 2 Replies

Categories

  • Tutorial
  • Reverse
  • Malware
  • Tooling

Socials

  • mailjeremy [dot] beaume {at} protonmail [dot] com
  • githubGithub
  • githubhttps://www.linkedin.com/in/beaumejeremy/