https://lsecqt.github.io/Red-Teaming-Army/malware-development/weaponizing-dll-hijacking-via-dll-proxying/
#malware_dev , #dll , #hijacking , #proxy
#malware_dev , #dll , #hijacking , #proxy
lsecqt.github.io
Weaponizing DLL Hijacking via DLL Proxying
Dynamic Link Library (DLL) is a collection of code that can be shared across multiple processes in Windows.
Process Injection - Avoiding Kernel Triggered Memory Scans.
r-tec.net/r-tec-blog-process…
#windows , #process_injection , #memory_scan
r-tec.net/r-tec-blog-process…
#windows , #process_injection , #memory_scan
❤🔥2
https://github.com/0xEr3bus/PoolPartyBof
A beacon object file implementation of PoolParty Process Injection Technique.
#github #tools #cs
A beacon object file implementation of PoolParty Process Injection Technique.
#github #tools #cs
GitHub
GitHub - 0xEr3bus/PoolPartyBof: A beacon object file implementation of PoolParty Process Injection Technique.
A beacon object file implementation of PoolParty Process Injection Technique. - 0xEr3bus/PoolPartyBof
❤🔥1
#LoadLibrary #memory
LoadLibrary for offensive operations (from disk, memory + don't link to PEB )
https://github.com/bats3c/DarkLoadLibrary
LoadLibrary for offensive operations (from disk, memory + don't link to PEB )
https://github.com/bats3c/DarkLoadLibrary
GitHub
GitHub - bats3c/DarkLoadLibrary: LoadLibrary for offensive operations
LoadLibrary for offensive operations. Contribute to bats3c/DarkLoadLibrary development by creating an account on GitHub.
Windows rootkit development for red teaming and adversary emulation
Excellent series by
@Idov31
Part 1:
https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html
Part 2:
https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html
Part 3:
https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html
Part 4:
https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html
PArt 5:
https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html
−−−−−−−−−−−−−−−−−−−−−−
#windows , #infosec , #rootkit , #red_team , #adversary_emulation
Excellent series by
@Idov31
Part 1:
https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html
Part 2:
https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html
Part 3:
https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html
Part 4:
https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html
PArt 5:
https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html
−−−−−−−−−−−−−−−−−−−−−−
#windows , #infosec , #rootkit , #red_team , #adversary_emulation
🤔3👍1
mdmz_book.pdf
70.4 MB
Malware development by cocomelonc
#malware_dev
https://cocomelonc.github.io/book/2022/07/16/mybook.html
#malware_dev
https://cocomelonc.github.io/book/2022/07/16/mybook.html
❤🔥3
Malware Development for Ethical Hackers
#malware_dev
https://github.com/PacktPublishing/Malware-Development-for-Ethical-Hackers
#malware_dev
https://github.com/PacktPublishing/Malware-Development-for-Ethical-Hackers
❤🔥2
Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers
#shellcode
https://github.com/snowcra5h/win32-shellcode
#shellcode
https://github.com/snowcra5h/win32-shellcode
GitHub
GitHub - 7etsuo/win32-shellcode: Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal…
Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers - GitHub - 7etsuo/win32-shellcode: Win32 Shellcode CheatSheet: You...
👍1
Malwild
The book is divided into three logical chapters:
Malware dev tricks from source code leaks
Malware analysis examples
Helper noscripts (most in python) for malware analysis
https://malware.news/t/malware-in-the-wild-book/76625
The book is divided into three logical chapters:
Malware dev tricks from source code leaks
Malware analysis examples
Helper noscripts (most in python) for malware analysis
https://malware.news/t/malware-in-the-wild-book/76625
👍3
malwild.pdf
83.9 MB
❤🔥8
RCE | XSS via Image Exif metadata
https://gokulvinesh.medium.com/rce-xss-via-image-exif-metadata-dddf33dadb41
#web , #xss , #rce ,#meta_data
https://gokulvinesh.medium.com/rce-xss-via-image-exif-metadata-dddf33dadb41
#web , #xss , #rce ,#meta_data
🤓3
awesome-windows-exploitation by farzin karemi
old but GOLD :)
https://web.archive.org/web/20170123124214/https://github.com/enddo/awesome-windows-exploitation
#windows , #exploit , #old_but_gold😁
old but GOLD :)
https://web.archive.org/web/20170123124214/https://github.com/enddo/awesome-windows-exploitation
#windows , #exploit , #old_but_gold😁
👍3