Part 1 of Countercept's research on module stomping - see https://blog.f-secure.com/hiding-malicious-code-with-module-stomping .
The full text of the associated blogpost is available in the Documentation directory.
| Name | Name | Last commit date | ||
|---|---|---|---|---|
Part 1 of Countercept's research on module stomping - see https://blog.f-secure.com/hiding-malicious-code-with-module-stomping .
The full text of the associated blogpost is available in the Documentation directory.