Not The Hidden Wiki
- Offensive Rust - link
- Creating Shellcode from any Code Using Visual Studio and C++ = link
- Learning Silver C2: Stagers - link
- Malicious Actors Use Unicode Support in Python to Evade Detection - link
- PowerShell Obfuscation Bible - link
- 11 Critical Malware Persistence Mechanisms - link
- Malware Articles - link
- x33fcon: Malware Development - link
- AV Evasion Techniques - link
- This map lists the essential techniques to bypass anti-virus and EDR - link
- Bypassing EDRs With EDR-Preloading - link
- Modern implant design: position independent malware development - link
- GraphStrike: Anatomy of Offensive Tool Development - link
- Calling Home, Get Your Callbacks Through RBI - link
- Syscalls via Vectored Exception Handling - link
- Bypass AMSI on Windows 11 - link
- An Introduction to Bypassing User Mode EDR Hooks - link
- Weaponizing DLL Hijacking via DLL Proxyinglink
- Bypassing Windows Defender - link
- Creating an OPSEC safe loader for Red Team Operations - link
- Process Injection - Avoiding Kernel Triggered Memory Scans - link
- Running PEs Inline Without a Console - link
- An Introduction into Stack Spoofing - link
- Writing a Windows Fuzzer From Scratch - link
- Bypassing UAC with SSPI Datagram Contexts - link 26
- Exploring Hell's Gate - link
- Inline Assembly - link
- Process injection in 2023, evading leading EDRs - link
- Abusing undocumented features to spoof PE section headers - link
- Direct Syscalls vs Indirect Syscalls - link
- Shell We Assemble? - link
- Direct Syscalls: A journey from high to low - link
- New AMSI Bypass Using CLR Hooking - link
- Evading Static Machine Learning Malware Detection Models – link
- Ten process injection techniques: A technical survey of common and trending process injection techniques - link
- Sandbox detection and evasion techniques. How malware has evolved over the last 10 years - link
- Shellcode Development - link
- (Anti-)Anti-Rootkit Techniques - Part I: UnKovering mapped rootkits - link
- Finding and utilising leaked code signing certificates - link
- Reflective DLL got Indirect Syscall skills - link
- Windows Admin-to-Kernel Elevation of Privilege - link
- Gold Pickaxe iOS Technical Analysis: IPA Overview and C2 Communication Start up - link
- Obfuscating native code for fun: Part 1 - Introduction - link
- addressofentrypoint overwrite process injection - link
- Backdooring PE files with shellcode - link
- Anti-debugging techniques - link
- Import Address Table hooking - link
- Anti-Debug tricks - link
- Intro to Hypervisor Implants - link
- MalDev Myths - link