Rust Malware Development - Process Enumeration and the Rust Windows API
Lonami's Memo tool:
https://github.com/lonami/memo
Lonami's Blog on Building a Game Hacking Engine with Rust:
https://lonami.dev/blog/woce-1/
MSDN article on Process Enumeration:
https://learn.microsoft.com/en-us/windows/win32/psapi/enumerating-all-modules-for-a-process
Consider a one-time tip on Ko-Fi, or become a monthly supporter of my research!
https://ko-fi.com/valhalla_dev
God this is so much easier than writing process enumeration code in C/C++...
Let's take another blackboard-enabled deep dive into the Rust implementation of the Windows API, this time for process enumeration!
-- Books and Resources --
Kernigan and Ritchie's book on C (affiliate link):
https://amzn.to/3ffh85F
Windows Internals (affiliate link):
https://amzn.to/3Wbw4Cl
Theo's video on Tutorial Hell:
https://www.youtube.com/watch?v=EkUuXQUByuw
My blog on moving to Mastodon:
https://www.valhallaresearch.net/why-im-moving-to-the-fediverse/
Follow me on Mastodon:
https://kolektiva.social/web/@valhalla_dev
--
You can find me on Twitter here:
https://twitter.com/valhalla_dev
You can also join my weekly newsletter, Valhalla Research, where I talk all things software, entrepreneurship, politics and finance:
https://valhallaresearch.substack.com/subscribe
My research blog:
https://valhallaresearch.net
--
#malware #reverseengineering #malwareanalysis