Profile cover photo
Profile photo
Cyberwarfare1
10 followers
10 followers
About
Posts

Post has attachment
Security: Basic DDoS Internals (No-source code)
Hi, For a long time, I did not post any scripts nor source codes as a result of education. Nevertheless I am posting today regarding how DDoS works & why hackers perform them. DDoS is a cyber-attack strategy used widely to make a machine resource or network...
Add a comment...

Post has attachment
Basic Simulation: Basic Gravity
Hi, Today as promised I'll be posting simulation programming basics. That being said, today I will be talking and discussing about Gravity however unlike my initial plan we will not be using any equations for simplicity purposes for the beginner audience. T...
Add a comment...

Post has attachment
Still a alive - Update
Hi, I have not posted anything for a while, but I am going to be posting from now. I apologize for the long delay, I did not really get around to posting any interesting topics recently however I plan on also writing few blogs regarding security soon or lat...
Add a comment...

Post has attachment
Global Remote Detour: KiFastSystemCall
Hi, I am not planning on explaining my code too much but rather give code, which is more or less straightforward in terms of the functions used and the simple logic. Unlike the previous remote detour given I am not really creating a running thread as that w...
Add a comment...

Post has attachment
Hooking x64 System Call Stub: X86SwitchTo64BitMode
Hi, It's been a while since I posted anything, anyway now that I am here I am going to be giving a hook for: X86SwitchTo64BitMode. X86SwthTo64BitMode is the deepest call before everything switches into 64 bit mode and other inaccessible DLL files. Additiona...
Add a comment...

Post has attachment
Security: Process Injection & hooking
Hi, I will be posting on how to inject into foreign processes then place a hook on specific API's, our example being MessageBoxA however this technique can be adapted to any API hook with slight change. Some useful API calls to hook would be: - NtOpenProces...
Add a comment...

Post has attachment
Hacking: Social Engineering using UAC
Hi, Today, we will be exploiting the UAC Architecture - for developers wanting to become savvy on Windows, UAC is a abbreviation for User Account Control it is designed to allow individual processes to run in various Account Levels, additionally it protects...
Add a comment...

Post has attachment
Project Delta Game Development
Hi, Unlike previous posts, this is nothing related to Security Field - I have been working on  Game tirelessly for few months now and I have yet to even start releasing the game as I still need to implement stronger AI, Bigger map, Higher Graphic Resolution...
Project Delta Game Development
Project Delta Game Development
codeempire.blogspot.com
Add a comment...

Post has attachment
Security: Blocking DLL Injections
Hi, Today - we will be discussing about Injections and prevention of Injections, malware in generally notorious for stealing vital information from Softwares - This causes concern for most Developers working in the Security and Financial Industry as in thes...
Security: Blocking DLL Injections
Security: Blocking DLL Injections
codeempire.blogspot.com
Add a comment...

Post has attachment
Kernel Drivers: Hiding True Identity
Hi, Today I will be discussing a method to hide true identity of a Kernel Mode Driver. This method is not well known but exploited by ZeroAccess Trojan quite well. I will add my own "unique" touch to it in order to make it more effective. This trick does  n...
Add a comment...
Wait while more posts are being loaded