Read and Edit external application's memory address space with ease (Windows os)
-
Updated
Dec 27, 2019 - VBA
Read and Edit external application's memory address space with ease (Windows os)
🐟 PoC of a VBA macro spawning a process with a spoofed parent and command line.
Add a description, image, and links to the windows-internals topic page so that developers can more easily learn about it.
To associate your repository with the windows-internals topic, visit your repo's landing page and select "manage topics."