Discover how to bypass antivirus detection by exploiting differences between Windows versions. This article explores the use of DLL hijacking and shellcode exec
This article discusses a new method of bypassing the Control Flow Guard (CFG) protection mechanism using Windows Remote Procedure Call (RPC). It analyzes CVE-20