Explore tweets tagged as #malwaredevelopment
@SEKTOR7net
SEKTOR7 Institute
1 month
Morphing shellcode during execution. Once a part of code is done executing, overwrite the block with new code to run. A proof of concept by Debjeet Banerjee (@whokilleddb) Src: https://t.co/Msj6JNOiZf #redteam #maldev #malwaredevelopment
2
41
167
@SEKTOR7net
SEKTOR7 Institute
1 month
Diving deep into Windows hypervisor. A great post by r0keb (@r0keb) on Hyper-V loader, partitions, startup and other details, combined with lots of rev-engineered C code. Worth reading! Source: https://t.co/DEz5zi24zd #redteam #maldev #malwaredevelopment
0
68
263
@5mukx
Smukx.E
2 years
4
38
159
@SEKTOR7net
SEKTOR7 Institute
2 months
Implementing a custom bootkit for Windows Sandbox exploration. An excellent post by Dylan Goods (@sdoogm) and Duncan Ogilvie (@mrexodia). Source: https://t.co/DNNwmHJDgp #redteam #maldev #malwaredevelopment
0
32
96
@0xfluxsec
flux
11 months
when i write malware, it goes undetected. when i write an antivirus / EDR (defensive software) windows says its malware?? #infosec #blueteam #redteam #malware #malwaredevelopment #edr #cyber #cybersecurity #redteamer #pentest #pentesting #rust #rustlang #programming #virus
5
1
8
@SEKTOR7net
SEKTOR7 Institute
2 months
Skipping Winsock - AFD.sys for-the-win! A series of posts by Mateusz Lewczak (@MateuszLewczak) on how to use afd.sys driver to implement custom network connectivity. Highly recommended! Source: https://t.co/2MAaAUZqUM #redteam #maldev #malwaredevelopment
1
66
246
@5mukx
Smukx.E
2 years
Hard work never fails. 6 hrs of constant coding is now working perfect nerds. 🥹 #maldev #redteaming #rustlang #malwaredevelopment #pentesting #dlls #doneit
3
1
36
@KitPloit
☣ KitPloit - Hacker Tools
4 years
0
18
43
@SEKTOR7net
SEKTOR7 Institute
2 months
A list of LSASS dumping techniques. From utilizing built-in commands, to minidump API and Shtinikering. A good post by Jonathan Bar Or (@yo_yo_yo_jbo). Source: https://t.co/R0YwBigki3 #redteam #blueteam #maldev #malwaredevelopment
0
80
328
@5mukx
Smukx.E
2 years
This week is tough, since I completed all my placement coding rounds. Now its time to get back into nerdy works! #malware #malwaredevelopment #nerds #cybersecurity #hacking #pentesting #redteam #nerds #nerdy
0
0
7
@SEKTOR7net
SEKTOR7 Institute
2 months
Writing exploits for MS-RPC services. An interesting case study of DoS inside Local Session Manager and how an exploit dev process looks like. A great post by Remco van der Meer (@incendiumrockz). Source: https://t.co/XX2xqOog7S #redteam #blueteam #maldev #malwaredevelopment
1
28
168
@valhalla_dev
developing valhalla
1 year
Putting out an absolute banger of a 20 minute video on #Rust #malwaredevelopment tomorrow and this sums up a lot of my frustrations.
0
0
1
@SEKTOR7net
SEKTOR7 Institute
2 months
Detecting rootkits in Windows kernel. First part of a rootkit detection series, depicting several ways to find malicious code residing in systems memory. Fantastic work by Sven Rath (@eversinc33). Post: https://t.co/AH9d8VnDYC #redteam #blueteam #maldev #malwaredevelopment
2
66
238
@securisec
securisec
4 years
0
1
1
@ApostolWario
ㅤㅤ ㅤ ㅤㅤ ㅤㅤㅤ ㅤ ㅤㅤ ㅤㅤㅤ ㅤ ㅤㅤ ㅤㅤㅤ ㅤㅤㅤㅤㅤ sudo rm -rf /*
4 years
0
2
1
@SEKTOR7net
SEKTOR7 Institute
3 months
Introducing bundles, both for individuals and teams! Now you can get several courses on a reduced pricing. Go check it out yourself! https://t.co/dRYEi1v2s8 #redteam #blueteam #maldev #malwaredevelopment #elearning
4
26
96
@_kavigihan
Kavishka Gihan
2 years
This is how "Windows Installation Files" can be weaponized into #malware that bypasses #Windows Defender in the latest Windows 11 distribution. #infosec #malwaredevelopment #zoom
4
12
79
@_kavigihan
Kavishka Gihan
2 years
"Self-deleting" #malware that bypasses #Windows Defender in the latest Windows 11 update using "Process Injection" to slip undetected, injecting shellcode into "OneDrive.exe". #infosec #malwaredevelopment #redteam
2
16
61