Exploitation 2 From Pixels to Payload Part 2: DLL Search Order Hijacking via explorer.exe Jul 12, 2025 From Pixels to Payload: LSB Steganography and In-Memory Execution Jul 9, 2025