Understanding Internals of SmokeLoader
https://irfan-eternal.github.io/understanding-internals-of-smokeloader/
https://irfan-eternal.github.io/understanding-internals-of-smokeloader/
irfan_eternal
Understanding Internals of SmokeLoader
Portable, simple and fast installer for Visual Studio Build Tools.
Downloads standalone 64-bit MSVC compiler, linker & other tools, also headers/libraries from Windows SDK, into a portable folder, without installing Visual Studio.
https://github.com/Data-Oriented-House/PortableBuildTools
Downloads standalone 64-bit MSVC compiler, linker & other tools, also headers/libraries from Windows SDK, into a portable folder, without installing Visual Studio.
https://github.com/Data-Oriented-House/PortableBuildTools
GitHub
GitHub - Data-Oriented-House/PortableBuildTools: Portable VS Build Tools installer
Portable VS Build Tools installer. Contribute to Data-Oriented-House/PortableBuildTools development by creating an account on GitHub.
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment
https://rootkits.xyz/blog/2017/06/kernel-setting-up/
https://rootkits.xyz/blog/2017/06/kernel-setting-up/
rootkit
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment - rootkit
Intro Recently, I had the pleasure to attend the training on Windows Kernel Exploitation at nullcon by the HackSysTeam. The training was well executed, and I got the intro into the world of kernel. But, as you know, nobody could teach you internals about…
Keylogging in the Windows kernel with undocumented data structures
https://eversinc33.com/posts/kernel-mode-keylogging/
https://eversinc33.com/posts/kernel-mode-keylogging/
SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem
https://www.ndss-symposium.org/wp-content/uploads/2024-926-paper.pdf
https://www.ndss-symposium.org/wp-content/uploads/2024-926-paper.pdf
Unveiling custom packers: A comprehensive guide
https://estr3llas.github.io/unveiling-custom-packers-a-comprehensive-guide/
https://estr3llas.github.io/unveiling-custom-packers-a-comprehensive-guide/
Estrellas’s Blog
Unveiling custom packers: A comprehensive guide
In this article, you'll be diving into an introduction to how packers work, some tips to unpack, and two walkthroughs showing off how i usually deal with custom packers.
Automating Qakbot Malware Analysis with Binary Ninja
https://invokere.com/posts/2024/02/automating-qakbot-malware-analysis-with-binary-ninja/
https://invokere.com/posts/2024/02/automating-qakbot-malware-analysis-with-binary-ninja/
Invokere
Automating Qakbot Malware Analysis with Binary Ninja
Throughout this blog post we provide Binary Ninja automation strategies for analyzing obfuscation techniques implemented by Qakbot.
This media is not supported in your browser
VIEW IN TELEGRAM
Когда накопил денег на IDA PRO
Static Analysis Automation for Hunting Vulnerable Kernel Drivers
https://speakerdeck.com/takahiro_haruyama/static-analysis-automation-for-hunting-vulnerable-kernel-drivers
https://speakerdeck.com/takahiro_haruyama/static-analysis-automation-for-hunting-vulnerable-kernel-drivers
Speaker Deck
Static Analysis Automation for Hunting Vulnerable Kernel Drivers
https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html
https://github.com/TakahiroHaruyama/VDR
Microsoft Windows allows lo…
https://github.com/TakahiroHaruyama/VDR
Microsoft Windows allows lo…
Analysing Windows Malware on Apple Mac M1/M2 ( Windows 11 ARM ) - Part I
x86/x64 emulation internals on Windows 11 ARM
https://int0xcc.svbtle.com/apple-m2-or-windows-arm-for-malware-analysis
x86/x64 emulation internals on Windows 11 ARM
https://int0xcc.svbtle.com/apple-m2-or-windows-arm-for-malware-analysis
Raashid Bhat on Svbtle
Analysing Windows Malware on Apple Mac M1/M2 ( Windows 11 ARM )...
x86/x64 emulation internals on Windows 11 ARM # Introduction # Since the introduction of Intel processors for the MacBooks, malware analysis on Mac has become quite popular, and it has become the hardware of choice for malware analysts. With the...