Posts by Tag
- Malware Development 10
- WinAPI 10
- C++ 10
- Execution 4
- Unpacking 3
- Shellcode 3
- Encryption 3
- Process Enumeration 3
- Registry 2
- .NET 2
- Injection 2
- Reverse Engineering 1
- Trojan 1
- Bot 1
- JavaScript 1
- PowerShell 1
- eCMAP 1
- Keylogger 1
- RAT 1
- Powershell 1
- Basics 1
- XOR 1
- DLL Injection 1
- Persistence 1
- Command and Control 1
- Data Exfiltration 1
- RC4 1
- Undocumented structures 1
- CTF 1
- Malware 1
- Forensics 1
- Macro 1
- Thread Hijacking 1
- APC Injection 1
- Memory 1
Malware Development
Malware Development: Crafting Digital Chaos 0x9: Private vs Mapped memory
Article 10 of Malware Development series
Malware Development: Crafting Digital Chaos 0x8: APC Injection
Article 9 of Malware Development series
Malware Development: Crafting Digital Chaos 0x7: Thread Hijacking techniques
Article 8 of Malware Development series
Malware Development: Crafting Digital Chaos 0x6: Undocumented structures
Article 7 of Malware Development series
Malware Development: Crafting Digital Chaos 0x5: Data Exfiltration
Article 6 of Malware Development series
Malware Development: Crafting Digital Chaos 0x4: Command and Control
Article 5 of Malware Development series
Malware Development: Crafting Digital Chaos 0x3: Local and Remote DLL Injection
Article 4 of Malware Development series
Malware Development: Crafting Digital Chaos 0x2: Embedding encrypted payloads in resource section
Article 3 of Malware Development series
Malware Development: Crafting Digital Chaos 0x1: Simple Payload Execution
Article 2 of Malware Development series
Malware Development: Crafting Digital Chaos 0x0: Basics
Article 1 of Malware Development series
WinAPI
Malware Development: Crafting Digital Chaos 0x9: Private vs Mapped memory
Article 10 of Malware Development series
Malware Development: Crafting Digital Chaos 0x8: APC Injection
Article 9 of Malware Development series
Malware Development: Crafting Digital Chaos 0x7: Thread Hijacking techniques
Article 8 of Malware Development series
Malware Development: Crafting Digital Chaos 0x6: Undocumented structures
Article 7 of Malware Development series
Malware Development: Crafting Digital Chaos 0x5: Data Exfiltration
Article 6 of Malware Development series
Malware Development: Crafting Digital Chaos 0x4: Command and Control
Article 5 of Malware Development series
Malware Development: Crafting Digital Chaos 0x3: Local and Remote DLL Injection
Article 4 of Malware Development series
Malware Development: Crafting Digital Chaos 0x2: Embedding encrypted payloads in resource section
Article 3 of Malware Development series
Malware Development: Crafting Digital Chaos 0x1: Simple Payload Execution
Article 2 of Malware Development series
Malware Development: Crafting Digital Chaos 0x0: Basics
Article 1 of Malware Development series
C++
Malware Development: Crafting Digital Chaos 0x9: Private vs Mapped memory
Article 10 of Malware Development series
Malware Development: Crafting Digital Chaos 0x8: APC Injection
Article 9 of Malware Development series
Malware Development: Crafting Digital Chaos 0x7: Thread Hijacking techniques
Article 8 of Malware Development series
Malware Development: Crafting Digital Chaos 0x6: Undocumented structures
Article 7 of Malware Development series
Malware Development: Crafting Digital Chaos 0x5: Data Exfiltration
Article 6 of Malware Development series
Malware Development: Crafting Digital Chaos 0x4: Command and Control
Article 5 of Malware Development series
Malware Development: Crafting Digital Chaos 0x3: Local and Remote DLL Injection
Article 4 of Malware Development series
Malware Development: Crafting Digital Chaos 0x2: Embedding encrypted payloads in resource section
Article 3 of Malware Development series
Malware Development: Crafting Digital Chaos 0x1: Simple Payload Execution
Article 2 of Malware Development series
Malware Development: Crafting Digital Chaos 0x0: Basics
Article 1 of Malware Development series
Execution
Malware Development: Crafting Digital Chaos 0x5: Data Exfiltration
Article 6 of Malware Development series
Malware Development: Crafting Digital Chaos 0x3: Local and Remote DLL Injection
Article 4 of Malware Development series
Malware Development: Crafting Digital Chaos 0x2: Embedding encrypted payloads in resource section
Article 3 of Malware Development series
Malware Development: Crafting Digital Chaos 0x1: Simple Payload Execution
Article 2 of Malware Development series
Unpacking
AsyncRAT config extraction and analysis
In depth analysis of AsyncRAT
Exposing Snake Keylogger - Analysis and Detection
In depth analysis of Snake Keylogger
Unpacking KOVTER Malware
here I demonstrate how to unpack KOVTER malware
Shellcode
Malware Development: Crafting Digital Chaos 0x2: Embedding encrypted payloads in resource section
Article 3 of Malware Development series
Malware Development: Crafting Digital Chaos 0x1: Simple Payload Execution
Article 2 of Malware Development series
Unpacking KOVTER Malware
here I demonstrate how to unpack KOVTER malware
Encryption
NahamCon CTF 2024 - Writeups
Some of the challenges I solved during NahamCon CTF 2024
Malware Development: Crafting Digital Chaos 0x6: Undocumented structures
Article 7 of Malware Development series
Malware Development: Crafting Digital Chaos 0x2: Embedding encrypted payloads in resource section
Article 3 of Malware Development series
Process Enumeration
Malware Development: Crafting Digital Chaos 0x7: Thread Hijacking techniques
Article 8 of Malware Development series
Malware Development: Crafting Digital Chaos 0x5: Data Exfiltration
Article 6 of Malware Development series
Malware Development: Crafting Digital Chaos 0x3: Local and Remote DLL Injection
Article 4 of Malware Development series
Registry
Malware Development: Crafting Digital Chaos 0x4: Command and Control
Article 5 of Malware Development series
Unpacking KOVTER Malware
here I demonstrate how to unpack KOVTER malware
.NET
AsyncRAT config extraction and analysis
In depth analysis of AsyncRAT
Exposing Snake Keylogger - Analysis and Detection
In depth analysis of Snake Keylogger
Injection
Malware Development: Crafting Digital Chaos 0x9: Private vs Mapped memory
Article 10 of Malware Development series
Malware Development: Crafting Digital Chaos 0x8: APC Injection
Article 9 of Malware Development series