Posts by Category

Malware Development

Malware Development: Crafting Digital Chaos 0x9: Private vs Mapped memory

Article 10 of Malware Development series

3 minute read

Malware Development: Crafting Digital Chaos 0x8: APC Injection

Article 9 of Malware Development series

7 minute read

Malware Development: Crafting Digital Chaos 0x7: Thread Hijacking techniques

Article 8 of Malware Development series

12 minute read

Malware Development: Crafting Digital Chaos 0x6: Undocumented structures

Article 7 of Malware Development series

5 minute read

Malware Development: Crafting Digital Chaos 0x5: Data Exfiltration

Article 6 of Malware Development series

9 minute read

Malware Development: Crafting Digital Chaos 0x4: Command and Control

Article 5 of Malware Development series

14 minute read

Malware Development: Crafting Digital Chaos 0x3: Local and Remote DLL Injection

Article 4 of Malware Development series

9 minute read

Malware Development: Crafting Digital Chaos 0x2: Embedding encrypted payloads in resource section

Article 3 of Malware Development series

5 minute read

Malware Development: Crafting Digital Chaos 0x1: Simple Payload Execution

Article 2 of Malware Development series

8 minute read

Malware Development: Crafting Digital Chaos 0x0: Basics

Article 1 of Malware Development series

10 minute read

Back to top ↑

Malware Analysis

Back to top ↑

CTF

Back to top ↑