<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[EntryPoint Hijacking]]></title><description><![CDATA[<p>EntryPoint Hijacking</p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://ipurple.team/2026/05/13/entrypoint-hijacking/" title="EntryPoint Hijacking">
<img src="https://i0.wp.com/ipurple.team/wp-content/uploads/2026/05/entrypoint-hijacking-cover.png?fit=1200%2C800&ssl=1" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://ipurple.team/2026/05/13/entrypoint-hijacking/">
EntryPoint Hijacking
</a>
</h5>
<p class="card-text line-clamp-3">The technique of EntryPoint Hijacking introduces a stealthier approach to code injection, as it doesn’t rely on API calls that create a new thread within the process context, and it is independent of the attack chain. Arbitrary code is written to memory, but it executes only when the process legitimately creates a new thread. This…</p>
</div>
<a href="https://ipurple.team/2026/05/13/entrypoint-hijacking/" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://ipurple.team/wp-content/uploads/2023/11/purple-unicorn-hacking-a-computer-1-2.jpg?w=32" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />







<p class="d-inline-block text-truncate mb-0">Purple Team <span class="text-secondary">(ipurple.team)</span></p>
</a>
</div></p><p>Read on HackerWorkspace: <a href="https://hackerworkspace.com/article/entrypoint-hijacking" rel="nofollow noopener"><span>https://</span><span>hackerworkspace.com/article/en</span><span>trypoint-hijacking</span></a></p><p><a href="https://infosec.exchange/tags/malware" rel="tag">#<span>malware</span></a> <a href="https://infosec.exchange/tags/cybersecurity" rel="tag">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/exploit" rel="tag">#<span>exploit</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/0c92f936-e4fe-4813-961f-0a9b41e43fc6/entrypoint-hijacking</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 01:52:10 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/0c92f936-e4fe-4813-961f-0a9b41e43fc6.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 13 May 2026 18:32:21 GMT</pubDate><ttl>60</ttl></channel></rss>