REVIEW: RED TEAM Operator: Malware Development Intermediate Course by SEKTOR7 Institute.

REVIEW: RED TEAM Operator: Malware Development Intermediate Course by SEKTOR7 Institute.
REVIEW: RED TEAM Operator: Windows Evasion Course by SEKTOR7 Institute.
Enumerate modules with CreateToolhelp32Snapshot.
Quick and dirty example of process enumeration using CreateToolhelp32Snapshot
Quick example of using WTSEnumerateProcesses to enumerate processes running on a Windows machine.
Accessing Alternate Data Streams on VMDK Images on Linux.
My review of SEKTOR7 Institute's Red Team Operator, Windows Persistence course.
Abusing finger.exe to send data over the network
Windows Startup Folder locations.
Review of RED TEAM Operator: Malware Development Essentials Course by SEKTOR7 Institute.
Notes about Windows Sysinternals tools from a security point of view.
Exit values on Windows are much more robust than on *nix systems. Here are some notes about exit values on Windows