Malware


About the Malware category (1)
Defeating Userland Hooks (ft. Bitdefender) (1)
Malware writing - Python malware, part 2: Keylogging with ctypes and SetWindowsHookExA (13)
Malware writing - Python Malware, part 3: Stealing credentials and cookies (7)
Python Windows Keylogger (9)
Malware writing - Python malware, part 1 ( 2 ) (21)
Successful spreading and operating of botnets (3)
Ransomware Development V3 (9)
Ransomware Development ( 2 ) (33)
Bypassing Crowdstrike Falcon detection, from phishing email to reverse shell ( 2 ) (22)
Blackcat Screen Capture (6)
Blackcat Keylogger (8)
Anti-forensic and File-less Malware (6)
Malware collecting (15)
New AV Bypass techniques ( 2 ) (22)
Anyone want more Malware? (10)
Reflective Dll Injection - Any Way to check If a process is already injected? (2)
Super-Stealthy Droppers (7)
Clientside Exploitation - Tricks of the Trade 0x01 - Sharpshooter + SquibblyTwo (8)
Run the Trap! How to Setup your own Honeypot to collect Malware samples ( 2 ) (27)
Kernel Mode Rootkits: File Deletion Protection (7)
Malware Books (too outdated to use) (5)
The Malicious Park is Open! (7)
Clientside Exploitation in 2018 - How Pentesting Has Changed (8)
Help: FUD virus (7)
Malware Sources (3)
Mirai Botnet Source Code (2)
Nestor10's Malware Analysis 101 - Anatomy of a Trojan Part 1/? (7)
Rewriting LibC functions in malwares (13)
Userland API Monitoring and Code Injection Detection (4)