Blue DeviL // SCT<p>Control Flow Hijacking via Data Pointers</p><p>CC: Jordan Jay</p><p><a href="https://www.legacyy.xyz/defenseevasion/windows/2025/04/16/control-flow-hijacking-via-data-pointers.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">legacyy.xyz/defenseevasion/win</span><span class="invisible">dows/2025/04/16/control-flow-hijacking-via-data-pointers.html</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/hijacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hijacking</span></a> <a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/binaryninja" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>binaryninja</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a></p>