dll   1363

« earlier    

secrary/InjectProc: InjectProc - Process Injection Techniques [This project is not maintained anymore]
InjectProc - Process Injection Techniques [This project is not maintained anymore] - secrary/InjectProc
security  programming  dll  injection  apc  async  windows 
5 days ago by plaxx
Home · Microsoft/Detours Wiki
Detours is a library for intercepting binary functions on ARM, x86, x64, and IA64 machines. Detours is most commonly used to intercept Win32 APIs calls within an application, such as to add debugging instrumentation. Interception code is applied dynamically at runtime. Detours replaces the first few instructions of the target function with an unconditional jump to the user-provided detour function. Instructions from the target function are placed in a trampoline. The address of the trampoline is placed in a target pointer. The detour function can either replace the target function or extend its semantics by invoking the target function as a subroutine through the target pointer to the trampoline.
hot-reloading  library  dll  windows  layer  debugging 
august 2018 by tgfrerer
Deploy Entity Framework Core 2.1 Migrations from a DLL – Benjamin Day Consulting, Inc.
We’ve got a new version of .NET Core and a new version of Entity Framework Core (EF Core). Unfortunately, EF Core 2.1 hasn’t made it any easier to deploy database migrations from DLLs rather than from the source code. (sigh) Deploying EF Core migrations from DLLs is a key feature for DevOps CI/CD stuff — especially if you’re doing “The Right Thing” and splitting your builds from your releases. For example, using VSTS Builds to compile your code and then VSTS Releases to deploy your apps into one or more environments.

Thankfully, there are options. If you’re trying to deploy EF migrations from TFS or VSTS, you can use my Build & Release Tools extension. If you’re using something else, I’ve got a batch script for you. I’ve been maintaining both of these for a while and with this release, I’ve taken some suggestions from the community and added some new features.

https://web.archive.org/web/20180827071358/https://www.benday.com/2018/07/05/deploy-entity-framework-core-2-1-migrations-from-a-dll/
https://archive.is/1xqtS

https://www.benday.com/2017/03/17/deploy-entity-framework-core-migrations-from-a-dll/
EntityFrameworkCore  migration  database  DLL  dotNETCore 
july 2018 by coffeebucket
Dependency Walker (depends.exe) Home Page
How to check for library dependency?
Dependency Walker is a free utility that scans any 32-bit or 64-bit Windows module (exe, dll, ocx, sys, etc.) and builds a hierarchical tree diagram of all dependent modules.
programming  software  tools  library  windows  dll  win32  dependency  development 
july 2018 by vitaminCPP

« earlier    

related tags

10  2017  2018  32  32bit  64bit  abi  active-directory  activex  ad  all  apc  api  archive  arma3  aslr  asp.net  assembly  async  authenticode  autocad  backwards  behind  beroot  bin  binaries  binary  book  breach  build  builder  buildsystems  bypass  bypassed  c#  c++  c  cairo  call  cfg  check  checker  ci  clang  cli  client  cmake  code  com+  com  commandline  compatibility  computers  configuration  console  control  converter  coreclr  cpu  crash  csharp  cyberreason  cybersecurity  cypress  database  dcom  debugging  decompiled  decompiling  deep-platform-crap  delayload  delicious  dep  dependency-walker  dependency  deployment  detection  development  devops  directory  dll_process_detach  docker  dotnet  dotnetcore  driver  drivers  dylib  dynamic  dynlib  emacs  entityframeworkcore  entry  error  eventloop  excel  exe  executable  exploit  exploitation  export  extension  external  extio  ffi  file  filter  fix  floss  flow  folder  format  framework  free  freeware  g  gac  github  gnutls  go  golang  guard  hacking  hash  hid  hidden  highentropyva  hijacking  hood  hook  hooking  hot-reload  hot-reloading  hotreload  hotswap  how  howto  https  hybrid  iat  icon  icons  ifttt  ilspy  image  images  import  info  infosec  injection  inspector  installer  intercepting  interoperability  invoke  javascript  key  layer  ldd  libraries  library  link  linker  linux  list  loader  loading  local  malware  managed  manifest  method  migration  mimikatz  mingw  minhook  module  mono  msvc  msvcp100  multithreading  native  net  nuget  object  openal  openal32.dll  opensource  openssl  os  package  password  patch  pe  pentesting  persistence  pinvoke  planting  platform-crap  plugin  poc  polymorphism  powershell  process-injection  programming  protection  psoc  psycopg  pymssql  python  qml  qt  ransomware  raymondchen  reference  reflection  reflective  registry  reload  reloading  research  reverse-engineering  reverse  rich  run  rundll32  runtime  rust  safeseh  scenes  sdlc  sdr  search  security  sensor  sentinel.dll  shared  shared_libraries  shell  shellcode  sideload  so  software  spike  ssl  static  stock  string  strongnaming  studio  sysadmin  test  tester  text  the  threadpool  to  tool  tools  tutorials  uac  under  unity  unmanaged  update  usb  using  utilities  validation  vbscript  visual  visualc++  visualstudio  webpack  websockets  whitelisting  win32  windows  winhttp  wordpress  xact  xingapi  xll  xp 

Copy this bookmark:



description:


tags: