Explore tweets tagged as #malwaredevelopment
Morphing shellcode during execution. Once a part of code is done executing, overwrite the block with new code to run. A proof of concept by Debjeet Banerjee (@whokilleddb) Src: https://t.co/Msj6JNOiZf
#redteam #maldev #malwaredevelopment
2
41
167
Diving deep into Windows hypervisor. A great post by r0keb (@r0keb) on Hyper-V loader, partitions, startup and other details, combined with lots of rev-engineered C code. Worth reading! Source: https://t.co/DEz5zi24zd
#redteam #maldev #malwaredevelopment
0
68
263
Wrote an POC of Windows API Hooking Code: https://t.co/t0kBorZtUO
#maldev #rust #redteam #cybersecurity #code #malwaredevelopment #code #offensiverust #infosec #unsafe
4
38
159
Implementing a custom bootkit for Windows Sandbox exploration. An excellent post by Dylan Goods (@sdoogm) and Duncan Ogilvie (@mrexodia). Source: https://t.co/DNNwmHJDgp
#redteam #maldev #malwaredevelopment
0
32
96
when i write malware, it goes undetected. when i write an antivirus / EDR (defensive software) windows says its malware?? #infosec #blueteam #redteam #malware #malwaredevelopment #edr #cyber #cybersecurity #redteamer #pentest #pentesting #rust #rustlang #programming #virus
5
1
8
Skipping Winsock - AFD.sys for-the-win! A series of posts by Mateusz Lewczak (@MateuszLewczak) on how to use afd.sys driver to implement custom network connectivity. Highly recommended! Source: https://t.co/2MAaAUZqUM
#redteam #maldev #malwaredevelopment
1
66
246
Hard work never fails. 6 hrs of constant coding is now working perfect nerds. 🥹 #maldev #redteaming #rustlang #malwaredevelopment #pentesting #dlls #doneit
3
1
36
ColdFire - Golang Malware Development Library https://t.co/PfmxvzV3zZ
#ColdFire #golang #GolangLibrary #MalwareDevelopment #OpenPorts
0
18
43
An POC for Self Deletion Malware Technique. Link: https://t.co/pNwPPMMZKk
#maldev #offensiverust #redteam #cybersecurity #infosecurity #infosec #blueteam #pentester #security #malwaredevelopment #malwareTips
0
27
93
A list of LSASS dumping techniques. From utilizing built-in commands, to minidump API and Shtinikering. A good post by Jonathan Bar Or (@yo_yo_yo_jbo). Source: https://t.co/R0YwBigki3
#redteam #blueteam #maldev #malwaredevelopment
0
80
328
This week is tough, since I completed all my placement coding rounds. Now its time to get back into nerdy works! #malware #malwaredevelopment #nerds #cybersecurity #hacking #pentesting #redteam #nerds #nerdy
0
0
7
Writing exploits for MS-RPC services. An interesting case study of DoS inside Local Session Manager and how an exploit dev process looks like. A great post by Remco van der Meer (@incendiumrockz). Source: https://t.co/XX2xqOog7S
#redteam #blueteam #maldev #malwaredevelopment
1
28
168
Putting out an absolute banger of a 20 minute video on #Rust #malwaredevelopment tomorrow and this sums up a lot of my frustrations.
0
0
1
Detecting rootkits in Windows kernel. First part of a rootkit detection series, depicting several ways to find malicious code residing in systems memory. Fantastic work by Sven Rath (@eversinc33). Post: https://t.co/AH9d8VnDYC
#redteam #blueteam #maldev #malwaredevelopment
2
66
238
"RT ColdFire - Golang Malware Development Library https://t.co/NJH9HnOoin
#ColdFire #golang #GolangLibrary #MalwareDevelopment #OpenPorts
https://t.co/GjcYAMgZqC"
0
1
1
ㅤㅤ ㅤ ㅤㅤ ㅤㅤㅤ ㅤ ㅤㅤ ㅤㅤㅤ ㅤ ㅤㅤ ㅤㅤㅤ ㅤㅤㅤㅤㅤ sudo rm -rf /*
4 years
https://t.co/mH9fFH0fJq - ColdFire - Golang Malware Development Library https://t.co/kmbNSorrCs
#ColdFire #golang #GolangLibrary #MalwareDevelopment #OpenPorts
https://t.co/7VPbynrxfF
#earmas
0
2
1
Introducing bundles, both for individuals and teams! Now you can get several courses on a reduced pricing. Go check it out yourself! https://t.co/dRYEi1v2s8
#redteam #blueteam #maldev #malwaredevelopment #elearning
4
26
96
This is how "Windows Installation Files" can be weaponized into #malware that bypasses #Windows Defender in the latest Windows 11 distribution. #infosec #malwaredevelopment #zoom
4
12
79
"Self-deleting" #malware that bypasses #Windows Defender in the latest Windows 11 update using "Process Injection" to slip undetected, injecting shellcode into "OneDrive.exe". #infosec #malwaredevelopment #redteam
2
16
61