Intro to Syscalls for Windows Malware
https://raw.githubusercontent.com/eversinc33/Talks/main/Intro-to-Syscalls-for-Windows-Malware_Prelude_04-12-2023.pdf
https://raw.githubusercontent.com/eversinc33/Talks/main/Intro-to-Syscalls-for-Windows-Malware_Prelude_04-12-2023.pdf
Malware Analysis Series has exactly 450 pages so far:
MAS_1: https://t.co/CqJcmTzygA
MAS_2: https://t.co/49XWAoYgb9
MAS_3: https://t.co/eVgSSSzBhQ
MAS_4: https://t.co/5b3zrZMZXk
MAS_5: https://t.co/JMqvn2wK67
MAS_6: https://t.co/7WKSDijTIb
MAS_7: https://t.co/V3rw0gSZfu
MAS_1: https://t.co/CqJcmTzygA
MAS_2: https://t.co/49XWAoYgb9
MAS_3: https://t.co/eVgSSSzBhQ
MAS_4: https://t.co/5b3zrZMZXk
MAS_5: https://t.co/JMqvn2wK67
MAS_6: https://t.co/7WKSDijTIb
MAS_7: https://t.co/V3rw0gSZfu
Exploit Reversing
Malware Analysis Series (MAS) – Article 1
The first article of MAS (Malware Analysis Series) is available for reading from: (link): Soon I have enough time, so I’ll publish an HTML version of it. Have an excellent day. Alexandre Borg…
Take a look into the depths of
Windows kernels and
reveal more than 60000
undocumented structures
https://www.vergiliusproject.com/
Windows kernels and
reveal more than 60000
undocumented structures
https://www.vergiliusproject.com/
Vergiliusproject
Vergilius Project
Take a look into the depths of Windows kernels and reveal more than 60000 undocumented structures.
Living Off The Land Drivers is a curated list of Windows drivers used by adversaries to bypass security controls and carry out attacks. The project helps security professionals stay informed and mitigate potential threats.
https://www.loldrivers.io/
https://www.loldrivers.io/
The result of self-research and
investigation of malware development
tricks, evasion techniques and
persistence
from zhussupov zhassulan (cocomelonc)
https://cocomelonc.github.io/assets/images/mdmz_book.pdf
investigation of malware development
tricks, evasion techniques and
persistence
from zhussupov zhassulan (cocomelonc)
https://cocomelonc.github.io/assets/images/mdmz_book.pdf
❤🔥1
unhooking-by-reading-ntdll-dll-fresh-copy
https://rioasmara.com/2022/02/28/process-unhooking-by-reading-ntdll-dll-fresh-copy/
https://rioasmara.com/2022/02/28/process-unhooking-by-reading-ntdll-dll-fresh-copy/
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
Process unhooking by reading ntdll.dll fresh copy
Hi All, I am going to share a simple code to allow you to unhook AV engine from the NTDLL by overwritting dll loaded into the process with the fresh copy of the dll. The expectation of overwritting…
📖#story
Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why?
https://www.theguardian.com/news/2023/may/09/on-the-trail-of-the-dark-avenger-the-most-dangerous-virus-writer-in-the-world
Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why?
https://www.theguardian.com/news/2023/may/09/on-the-trail-of-the-dark-avenger-the-most-dangerous-virus-writer-in-the-world
the Guardian
On the trail of the Dark Avenger: the most dangerous virus writer in the world
The long read: Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why?