We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Registry malicious trickery and Reghide.exe: https://www.tripwire.com/state-of-security/mitre-framework/evade-detection-hiding-registry/
Key is created here on x64 Windows: HKCU\Software\Classes\VirtualStore\MACHINE\SOFTWARE\WOW6432Node\Systems Internals\Can’t touch me!
I can use error catching with a match statement to find this evil but would love to be able to open that and keys like it and read all values.
If I can help in any way with this crate I would love to. Just have never worked with crates and Rust Win API access directly either.
Thanks
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Registry malicious trickery and Reghide.exe: https://www.tripwire.com/state-of-security/mitre-framework/evade-detection-hiding-registry/
Key is created here on x64 Windows: HKCU\Software\Classes\VirtualStore\MACHINE\SOFTWARE\WOW6432Node\Systems Internals\Can’t touch me!
I can use error catching with a match statement to find this evil but would love to be able to open that and keys like it and read all values.
If I can help in any way with this crate I would love to. Just have never worked with crates and Rust Win API access directly either.
Thanks
The text was updated successfully, but these errors were encountered: