COM Objects Hijacking ~ VirusTotal BlogThe COM Hijacking technique is often utilized by threat actors and various malware families to achieve both persistence and privilege escal...#com-objects#windows#windows-malware·blog.virustotal.com·Mar 8, 2024COM Objects Hijacking ~ VirusTotal Blog
rabbitstack/fibratus: A modern tool for Windows kernel exploration and tracing with a focus on securityA modern tool for Windows kernel exploration and tracing with a focus on security#malware-analysis#tracing#windows#windows-monitoring·github.com·Sep 3, 2023rabbitstack/fibratus: A modern tool for Windows kernel exploration and tracing with a focus on security