Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

modexp.wordpress.com

modexp

Get the latest updates from modexp directly as they happen.

Follow now 99 followers

Latest posts

Last updated about 2 months ago

Beacon Object Files vs Tiny Executables

about 2 months ago

Introduction Executing PE files in-memory is something we can trace back to...

Shellcode: Obfuscation with Permutations

8 months ago

Table Of Contents Introduction Affine Transformation Linear Congruential Generator (LCG) Inversive Congruential...

Shellcode: Windows on ARM64 / AArch64

9 months ago

Introduction Back in October 2018, I wanted to write ARM assembly on...

Shellcode: API Hashing with Block Ciphers (Maru4)

10 months ago

Introduction Constructing your own hash algorithm is controversial because there will always...

Shellcode: RSA (Data Masking 4)

10 months ago

Introduction Malware like OceanLotus have used RSA-256 to hide strings. Darkhotel used...

Shellcode: Pseudo-Random Involution (Data Masking 3)

10 months ago

Introduction Not sure if the title is an accurate description, but when...

Shellcode: Modular Exponentiation for Diffie-Hellman Key Exchange.

11 months ago

Table Of Contents Introduction Symmetric vs Asymmetric Encryption with RSA Digital Signatures...

Shellcode: Data Masking 2

about 1 year ago

Introduction This is a quick follow up post to Data Masking that...

WOW64 Callback Table (FinFisher)

about 2 years ago

Introduction Ken Johnson (otherwise known as Skywing) first talked about the KiUserExceptionDispatcher...

Shellcode: Entropy Reduction With Base-32 Encoding.

about 2 years ago

Introduction Compressed, encrypted, and random data all contain a high amount of...

Shellcode: Base-N Decoding for Text-Only Compression and Obfuscation

almost 3 years ago

Introduction Concise Binary Object Representation (CBOR), the binary equivalent to JavaScript Object...

Shellcode: Data Masking

almost 3 years ago

Introduction There are more than four ways to mask data, but these...