Posts by Tag

Malware Development

Malware Development: Crafting Digital Chaos 0x9: Private vs Mapped memory

Article 10 of Malware Development series

3 minute read

Malware Development: Crafting Digital Chaos 0x8: APC Injection

Article 9 of Malware Development series

7 minute read

Malware Development: Crafting Digital Chaos 0x7: Thread Hijacking techniques

Article 8 of Malware Development series

12 minute read

Malware Development: Crafting Digital Chaos 0x6: Undocumented structures

Article 7 of Malware Development series

5 minute read

Malware Development: Crafting Digital Chaos 0x5: Data Exfiltration

Article 6 of Malware Development series

9 minute read

Malware Development: Crafting Digital Chaos 0x4: Command and Control

Article 5 of Malware Development series

14 minute read

Malware Development: Crafting Digital Chaos 0x3: Local and Remote DLL Injection

Article 4 of Malware Development series

9 minute read

Malware Development: Crafting Digital Chaos 0x2: Embedding encrypted payloads in resource section

Article 3 of Malware Development series

5 minute read

Malware Development: Crafting Digital Chaos 0x1: Simple Payload Execution

Article 2 of Malware Development series

8 minute read

Malware Development: Crafting Digital Chaos 0x0: Basics

Article 1 of Malware Development series

10 minute read

Back to top ↑

WinAPI

Malware Development: Crafting Digital Chaos 0x9: Private vs Mapped memory

Article 10 of Malware Development series

3 minute read

Malware Development: Crafting Digital Chaos 0x8: APC Injection

Article 9 of Malware Development series

7 minute read

Malware Development: Crafting Digital Chaos 0x7: Thread Hijacking techniques

Article 8 of Malware Development series

12 minute read

Malware Development: Crafting Digital Chaos 0x6: Undocumented structures

Article 7 of Malware Development series

5 minute read

Malware Development: Crafting Digital Chaos 0x5: Data Exfiltration

Article 6 of Malware Development series

9 minute read

Malware Development: Crafting Digital Chaos 0x4: Command and Control

Article 5 of Malware Development series

14 minute read

Malware Development: Crafting Digital Chaos 0x3: Local and Remote DLL Injection

Article 4 of Malware Development series

9 minute read

Malware Development: Crafting Digital Chaos 0x2: Embedding encrypted payloads in resource section

Article 3 of Malware Development series

5 minute read

Malware Development: Crafting Digital Chaos 0x1: Simple Payload Execution

Article 2 of Malware Development series

8 minute read

Malware Development: Crafting Digital Chaos 0x0: Basics

Article 1 of Malware Development series

10 minute read

Back to top ↑

C++

Malware Development: Crafting Digital Chaos 0x9: Private vs Mapped memory

Article 10 of Malware Development series

3 minute read

Malware Development: Crafting Digital Chaos 0x8: APC Injection

Article 9 of Malware Development series

7 minute read

Malware Development: Crafting Digital Chaos 0x7: Thread Hijacking techniques

Article 8 of Malware Development series

12 minute read

Malware Development: Crafting Digital Chaos 0x6: Undocumented structures

Article 7 of Malware Development series

5 minute read

Malware Development: Crafting Digital Chaos 0x5: Data Exfiltration

Article 6 of Malware Development series

9 minute read

Malware Development: Crafting Digital Chaos 0x4: Command and Control

Article 5 of Malware Development series

14 minute read

Malware Development: Crafting Digital Chaos 0x3: Local and Remote DLL Injection

Article 4 of Malware Development series

9 minute read

Malware Development: Crafting Digital Chaos 0x2: Embedding encrypted payloads in resource section

Article 3 of Malware Development series

5 minute read

Malware Development: Crafting Digital Chaos 0x1: Simple Payload Execution

Article 2 of Malware Development series

8 minute read

Malware Development: Crafting Digital Chaos 0x0: Basics

Article 1 of Malware Development series

10 minute read

Back to top ↑

Execution

Back to top ↑

Unpacking

Back to top ↑

Shellcode

Back to top ↑

Encryption

Back to top ↑

Process Enumeration

Back to top ↑

Registry

Back to top ↑

.NET

Back to top ↑

Injection

Back to top ↑

Reverse Engineering

Back to top ↑

Trojan

Back to top ↑

Bot

Back to top ↑

JavaScript

Back to top ↑

PowerShell

Back to top ↑

eCMAP

Back to top ↑

Keylogger

Back to top ↑

RAT

Back to top ↑

Powershell

Back to top ↑

Basics

Back to top ↑

XOR

Back to top ↑

DLL Injection

Back to top ↑

Persistence

Back to top ↑

Command and Control

Back to top ↑

Data Exfiltration

Back to top ↑

RC4

Back to top ↑

Undocumented structures

Back to top ↑

CTF

Back to top ↑

Malware

Back to top ↑

Forensics

Back to top ↑

Macro

Back to top ↑

Thread Hijacking

Back to top ↑

APC Injection

Back to top ↑

Memory

Back to top ↑