Malware


About the Malware category (1)
Super-Stealthy Droppers (6)
Clientside Exploitation - Tricks of the Trade 0x01 - Sharpshooter + SquibblyTwo (8)
Run the Trap! How to Setup your own Honeypot to collect Malware samples ( 2 ) (27)
Kernel Mode Rootkits: File Deletion Protection (7)
Malware Books (too outdated to use) (5)
The Malicious Park is Open! (7)
Clientside Exploitation in 2018 - How Pentesting Has Changed (8)
Help: FUD virus (7)
Malware Sources (3)
Mirai Botnet Source Code (2)
Nestor10's Malware Analysis 101 - Anatomy of a Trojan Part 1/? (7)
Rewriting LibC functions in malwares (13)
Userland API Monitoring and Code Injection Detection (4)
Ransomware Development ( 2 ) (31)
Linux.Cephei: a Nim virus (10)
Tutorial: Creating Yara Signatures for Malware Detection (3)
Execute malware by opening steganographic image (5)
Android Malware - Start the app at boot and get kernel Version 0x01 (4)
Malware Decompiling and Unpacking (Loda Keylogger) (6)
[ANALYSIS | UNPACKING] Firestorm - Self-extracting Archive (8)
Internet Chemotherapy (8)
Help to unpack malware (enigma)? ( 2 ) (21)
IBI Crypter. A JIT Crypter PoC (11)
[Links] Probably worth reading (7)
Reflective DLL Injection (11)
IoT Malware Droppers (Mirai and Hajime) (11)
How to get a Super Stelfy Shell (that AV doesn't pick up) ( 2 ) (23)
User Mode Rootkits: IAT and Inline Hooking (8)
Introduction to the Android Malware Series - 0x00 (15)