Intro to Syscalls for Windows Malware
https://raw.githubusercontent.com/eversinc33/Talks/main/Intro-to-Syscalls-for-Windows-Malware_Prelude_04-12-2023.pdf
https://raw.githubusercontent.com/eversinc33/Talks/main/Intro-to-Syscalls-for-Windows-Malware_Prelude_04-12-2023.pdf
Malware Analysis Series has exactly 450 pages so far:
MAS_1: https://t.co/CqJcmTzygA
MAS_2: https://t.co/49XWAoYgb9
MAS_3: https://t.co/eVgSSSzBhQ
MAS_4: https://t.co/5b3zrZMZXk
MAS_5: https://t.co/JMqvn2wK67
MAS_6: https://t.co/7WKSDijTIb
MAS_7: https://t.co/V3rw0gSZfu
MAS_1: https://t.co/CqJcmTzygA
MAS_2: https://t.co/49XWAoYgb9
MAS_3: https://t.co/eVgSSSzBhQ
MAS_4: https://t.co/5b3zrZMZXk
MAS_5: https://t.co/JMqvn2wK67
MAS_6: https://t.co/7WKSDijTIb
MAS_7: https://t.co/V3rw0gSZfu
Exploit Reversing
Malware Analysis Series (MAS) – Article 1
The first article of MAS (Malware Analysis Series) is available for reading from: (link): Soon I have enough time, so I’ll publish an HTML version of it. Have an excellent day. Alexandre Borg…
Take a look into the depths of
Windows kernels and
reveal more than 60000
undocumented structures
https://www.vergiliusproject.com/
Windows kernels and
reveal more than 60000
undocumented structures
https://www.vergiliusproject.com/
Vergiliusproject
Vergilius Project
Take a look into the depths of Windows kernels and reveal more than 60000 undocumented structures.
Living Off The Land Drivers is a curated list of Windows drivers used by adversaries to bypass security controls and carry out attacks. The project helps security professionals stay informed and mitigate potential threats.
https://www.loldrivers.io/
https://www.loldrivers.io/
The result of self-research and
investigation of malware development
tricks, evasion techniques and
persistence
from zhussupov zhassulan (cocomelonc)
https://cocomelonc.github.io/assets/images/mdmz_book.pdf
investigation of malware development
tricks, evasion techniques and
persistence
from zhussupov zhassulan (cocomelonc)
https://cocomelonc.github.io/assets/images/mdmz_book.pdf
❤🔥1
unhooking-by-reading-ntdll-dll-fresh-copy
https://rioasmara.com/2022/02/28/process-unhooking-by-reading-ntdll-dll-fresh-copy/
https://rioasmara.com/2022/02/28/process-unhooking-by-reading-ntdll-dll-fresh-copy/
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
Process unhooking by reading ntdll.dll fresh copy
Hi All, I am going to share a simple code to allow you to unhook AV engine from the NTDLL by overwritting dll loaded into the process with the fresh copy of the dll. The expectation of overwritting…
📖#story
Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why?
https://www.theguardian.com/news/2023/may/09/on-the-trail-of-the-dark-avenger-the-most-dangerous-virus-writer-in-the-world
Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why?
https://www.theguardian.com/news/2023/may/09/on-the-trail-of-the-dark-avenger-the-most-dangerous-virus-writer-in-the-world
the Guardian
On the trail of the Dark Avenger: the most dangerous virus writer in the world
The long read: Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why?
What Windows binaries can do:
https://lolbas-project.github.io/
https://lolbas-project.github.io/
<Linux~>
techniques:
https://tmpout.sh/
https://cpl0.zip
crash course on linux rootkits:
https://xcellerator.github.io/categories/linux/
possibly the best resource at ur disposal, kernel source cross referencer
https://elixir.bootlin.com/linux/latest/source/kernel
linux internals:
https://github.com/theja0473/My-Lib-Books-1/blob/master/UnderStanding%20The%20Linux%20Kernel%203rd%20Edition%20V413HAV.pdf
use google translate but these chinese people have some insane techniques:
https://blog.csdn.net
techniques:
https://tmpout.sh/
https://cpl0.zip
crash course on linux rootkits:
https://xcellerator.github.io/categories/linux/
possibly the best resource at ur disposal, kernel source cross referencer
https://elixir.bootlin.com/linux/latest/source/kernel
linux internals:
https://github.com/theja0473/My-Lib-Books-1/blob/master/UnderStanding%20The%20Linux%20Kernel%203rd%20Edition%20V413HAV.pdf
use google translate but these chinese people have some insane techniques:
https://blog.csdn.net
linux
linux :: TheXcellerator
-malware creation to data exfiltration
https://blog.hacktivesecurity.com/index.php/2023/06/05/inside-the-mind-of-a-cyber-attacker-from-malware-creation-to-data-exfiltration-part-1/
https://blog.hacktivesecurity.com/index.php/2023/06/05/inside-the-mind-of-a-cyber-attacker-from-malware-creation-to-data-exfiltration-part-1/