Web Security Learning
stable

Content Index:

  • 1. Prologue
  • 2. Computer Networks and Protocols
  • 3. Information Collection
  • 4. Common vulnerability attack and defense
  • 5. Language and Framework
    • 5.1. PHP
    • 5.2. Python
    • 5.3. Java
    • 5.4. JavaScript
    • 5.5. Golang
    • 5.6. Ruby
    • 5.7. ASP
    • 5.8. PowerShell
    • 5.9. Shell
    • 5.10. CSharp
      • 5.10.1. Exploiting techniques
      • 5.10.2. Reference Links
        • 5.10.2.1. .Net
        • 5.10.2.2. Exploiting techniques
  • 6. Intranet penetration
  • 7. Cloud Security
  • 8. Defense Technology
  • 9. Authentication Mechanism
  • 10. Tools and Resources
  • 11. Manual Quick Check
  • 12. Others
Web Security Learning
  • »
  • 5. Language and Framework »
  • 5.10. CSharp »
  • 5.10.2. Reference Links

5.10.2. Reference Links¶

5.10.2.1. .Net¶

  • .NET documentation

5.10.2.2. Exploiting techniques¶

  • Emulating Covert Operations - Dynamic Invocation (Avoiding PInvoke & API Hooks)

Previous Next

© Copyright 2019-2022, WebSecurity.

Built with Sphinx using a theme provided by Read the Docs.