Abusing DLLs EntryPoint for the Fun, (Fri, Dec 12th)

In the Microsoft Windows ecosystem, DLLs (Dynamic Load Libraries) are PE files like regular programs. One of the main differences is that they export functions that can be called by programs that load them. By example, to call RegOpenKeyExA(), the program must first load the ADVAPI32.dll. A PE files has a lot of headers (metadata) that contain useful information used by the loader to prepare the execution in memory. One of them is the EntryPoint, it contains the (relative virtual) address where the program will start to execute.

Continue reading Abusing DLLs EntryPoint for the Fun, (Fri, Dec 12th)

Posted in Uncategorized

Using AI Gemma 3 Locally with a Single CPU , (Wed, Dec 10th)

Several months ago, I got a Nucbox K8 Plus minicomputer to use as a Proxmox 9 server. At the time of this acquisition, I didn&#;x26;#;39;t realize this minicomputer had an artificial intelligence (AI) engine [1] build in the CPU that could be used to run AI applications locally. A coworker recommended that I try Google Gemma 3 as a local AI open model to work with my use cases.

Continue reading Using AI Gemma 3 Locally with a Single CPU , (Wed, Dec 10th)

Posted in Uncategorized

AutoIT3 Compiled Scripts Dropping Shellcodes, (Fri, Dec 5th)

AutoIT3[1] is a powerful language that helps to built nice applications for Windows environments, mainly to automate tasks. If it looks pretty old, the latest version was released last September and it remains popular amongst developers, for the good… or the bad! Malware written in AutoIt3 has existed since the late 2000s, when attackers realized that the language was easy to learn (close to basic) but can also compiled into standalone PE files! From a malware point of view, such executables make an extended use of packed data, making them more stealthy.

Continue reading AutoIT3 Compiled Scripts Dropping Shellcodes, (Fri, Dec 5th)

Posted in Uncategorized