Low Level CO 🇨🇴 – Telegram
Low Level CO 🇨🇴
131 subscribers
199 photos
12 videos
7 files
591 links
Canal enfocado en la investigación de técnicas de seguridad ofensivas avanzadas.

Windows internals
Malware Development
Exploits & Reversing
Low level programming
kernel mode & user mode
Syscall & Hypercalls
Ring 0, 3, -1
Firmware
Download Telegram
🇺🇸 BRICKSTORM Backdoor Analysis

BRICKSTORM is a custom Executable and Linkable Format (ELF) Go-based backdoor. The analyzed
samples differ in function, but all enable cyber actors to maintain stealthy access and provide capabilities
for initiation, persistence, and secure command and control (C2). Even though the analyzed samples were
for VMware vSphere environments, there is reporting about Windows versions.
#malware_analysis
@ZwLowLevel
Please open Telegram to view this post
VIEW IN TELEGRAM
😽 Un recurso bastante interesante llamdado "VX-API", el cual tiene fragmentos de técnicas que se utilizan en MalwareDev.

#malware_development #maldev
#malwaredev

@ZwLowLevel
https://vx-api.gitbook.io/vx-api/code-base/markdown
Please open Telegram to view this post
VIEW IN TELEGRAM
Cooolis-ms

Cooolis-ms is a tool that incorporates the Metasploit Payload Loader, Cobalt Strike External C2 Loader, and Reflective DLL injection.

#malware_development
#maldev
#malwaredev
@ZwLowLevel
https://github.com/otuhsgcasg/Cooolis-ms-C2-Loader-Metasploit
svc-hook: System Call Hook for ARM64

svc-hook is a system call hook mechanism for ARM64. It is designed to be low performance overhead, independent of the target source code, without relying on kernel features.

#arm64
#arm64_internals
#syscall
#system_call
@ZwLowLevel
https://github.com/retrage/svc-hook