Low Level CO 🇨🇴 – Telegram
Low Level CO 🇨🇴
131 subscribers
201 photos
12 videos
7 files
598 links
Canal enfocado en la investigación de técnicas de seguridad ofensivas avanzadas.

Windows internals
Malware Development
Exploits & Reversing
Low level programming
kernel mode & user mode
Syscall & Hypercalls
Ring 0, 3, -1
Firmware
Download Telegram
Low Level CO 🇨🇴 pinned «💀 Direct kernel object manipulation (DKOM) attacks on ETW providers #windows_kernel #windows_internals #etw #dkom @ZwLowLevel»
😎 Shellcode Fluctuation

A sophisticated proof-of-concept demonstrating advanced in-memory evasion techniques that cyclically encrypts and decrypts shellcode while fluctuating between different memory protection states to evade detection by memory scanners.

#malware_development #maldev

@ZwLowLevel
Please open Telegram to view this post
VIEW IN TELEGRAM
LOLRMM

LOLRMM is a curated list of Remote Monitoring and Management (RMM) tools that could potentially be abused by threat actors.

#windows_internals #sysmon
@ZwLowLevel
https://lolrmm.io/
🇺🇸 BRICKSTORM Backdoor Analysis

BRICKSTORM is a custom Executable and Linkable Format (ELF) Go-based backdoor. The analyzed
samples differ in function, but all enable cyber actors to maintain stealthy access and provide capabilities
for initiation, persistence, and secure command and control (C2). Even though the analyzed samples were
for VMware vSphere environments, there is reporting about Windows versions.
#malware_analysis
@ZwLowLevel
Please open Telegram to view this post
VIEW IN TELEGRAM
😽 Un recurso bastante interesante llamdado "VX-API", el cual tiene fragmentos de técnicas que se utilizan en MalwareDev.

#malware_development #maldev
#malwaredev

@ZwLowLevel
https://vx-api.gitbook.io/vx-api/code-base/markdown
Please open Telegram to view this post
VIEW IN TELEGRAM